00000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:40 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000020c0)='/proc/zoneinfo\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) 22:19:40 executing program 2: syz_io_uring_setup(0x30e8, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000df2000/0x1000)=nil, &(0x7f00000005c0), 0x0) syz_io_uring_setup(0x1387, &(0x7f00000000c0), &(0x7f0000f70000/0x11000)=nil, &(0x7f0000f80000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 22:19:40 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000300)={{0x3, @bcast}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast]}, 0x48) [ 572.720073][T11852] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 22:19:41 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x40000, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000200)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, 0x0, 0x1) openat$vfio(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vfio/vfio\x00', 0x80040, 0x0) [ 572.851040][T11852] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 572.980206][T11852] EXT4-fs (loop1): mount failed 22:19:41 executing program 4: syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) 22:19:41 executing program 2: syz_io_uring_setup(0x0, &(0x7f00000000c0), &(0x7f0000d34000/0x4000)=nil, &(0x7f0000db4000/0x4000)=nil, &(0x7f0000000140), 0xffffffffffffffff) 22:19:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 573.651757][T11885] NFS: Device name not specified [ 573.702215][T11885] NFS: Device name not specified 22:19:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000640)={0x14, 0x0, 0x0, 0x3}, 0x14}}, 0x0) [ 573.974537][T11891] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 22:19:42 executing program 2: syz_io_uring_setup(0x1385, &(0x7f00000000c0), &(0x7f00003fd000/0xc00000)=nil, &(0x7f0000db4000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3d71, &(0x7f0000000040), &(0x7f0000ff9000/0x4000)=nil, &(0x7f00008ee000/0x3000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x6456, &(0x7f0000000400), &(0x7f0000d54000/0x2000)=nil, &(0x7f000086f000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) 22:19:42 executing program 4: openat$userio(0xffffffffffffff9c, &(0x7f0000000500)='/dev/userio\x00', 0x0, 0x0) 22:19:42 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 574.133957][T11891] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 22:19:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000240)) [ 574.246274][T11891] EXT4-fs (loop1): mount failed 22:19:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:43 executing program 5: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=ANY=[@ANYBLOB=')']) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) 22:19:43 executing program 3: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=ANY=[]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) 22:19:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2}, 0x40) 22:19:43 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 575.060456][T11931] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 575.082960][T11931] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 575.115410][T11931] EXT4-fs (loop1): mount failed 22:19:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:43 executing program 5: syz_io_uring_setup(0x30e8, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000df2000/0x1000)=nil, &(0x7f00000005c0), 0x0) syz_io_uring_setup(0x4d44, &(0x7f00000000c0), &(0x7f0000cab000/0x2000)=nil, &(0x7f0000db4000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 22:19:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000640)={0x14, 0x0, 0x0, 0x3}, 0x14}}, 0x0) 22:19:44 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:19:44 executing program 2: mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40030, 0xffffffffffffffff, 0x10000000) 22:19:44 executing program 4: syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{'/'}]}) execveat(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', &(0x7f0000001480)=[&(0x7f00000012c0)='permit_directio', &(0x7f0000001300)='[\x00'], 0x0, 0x1000) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 575.940449][T11948] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 575.997782][T11948] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 576.024072][T11948] EXT4-fs (loop1): mount failed 22:19:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:44 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 22:19:44 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/autofs\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000d, 0x11, r0, 0x8000000) 22:19:44 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000a40)={&(0x7f00007ca000/0x10000)=nil, &(0x7f000085e000/0x1000)=nil, &(0x7f000040b000/0x1000)=nil, &(0x7f0000dbe000/0x2000)=nil, &(0x7f0000faa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00006d5000/0x2000)=nil, &(0x7f00004f3000/0x4000)=nil, &(0x7f0000562000/0x3000)=nil, &(0x7f00007e8000/0x3000)=nil, &(0x7f0000a6e000/0x400000)=nil, 0x0}, 0x68) 22:19:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 577.035188][T11986] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 577.061420][T11986] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 22:19:45 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 577.176484][T11986] EXT4-fs (loop1): mount failed 22:19:45 executing program 5: io_setup(0x7, &(0x7f0000000800)=0x0) io_submit(r0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)="9610b7a4262746f2a2cba14c8bc793bef1215e880fb73a326a1ede79654fbbe9f699f00dd1b01e3e93fbf46e72a26e9c833aa1b1303b2085db17ec1ff662643d2698af609bae302f3a45acd296b4b67bb1d64592a006eb672a1239ee88f9a4df3c119485b9fd32ece8a395bc6dd0853c3de579686dbff67c60430131ebf5198610d5e5bec84bec254e04e1458211cdf5a4d15e14f938d655041e1422c7876484f8e5c5e17f7db5cffb0625a6d55ac40dff", 0xfffffffffffffe80, 0xea05, 0x0, 0x2}]) 22:19:45 executing program 3: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x77359400}, 0x0) 22:19:45 executing program 2: msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x5) 22:19:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:46 executing program 4: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0) syz_mount_image$minix(&(0x7f0000000a00)='minix\x00', 0x0, 0x0, 0x6, &(0x7f0000000f40)=[{&(0x7f0000000a80)="5585603214b8470f3ef287fa061500ff64ef29a6cfc7b9297c7ed42f1efb10817484739c19aee7c0f95d70d2b15086e1221a71ff68bba544451ad1047d401daea7925188799ac6fe209dccdfba6567685ddaf06813bc0b90657cb9c55d4604c9e692becc26ed841b3b2af19e6674819f86faa438ad645e7d248e875043d2e04cd2bc9c191f7e741682c119ac04ea9dee6cb6ac93b93ac2806fbf5ba60064a7ca8f0413", 0xa3, 0x9}, {&(0x7f0000000b40), 0x0, 0x7}, {&(0x7f0000000c00)="0bcd9564e91f9f4908ed8b650b5a99032563f5cc60c871eaad723243a55fdebe8fa8497f2590cf7612a69b4c5118310d1e62f0a922b0c5ed4199b4bd65dbe01145b50088706e1eb2abe9437d478f76d7c1fe9e3cd6a8f6a948cbe28540039632407cbc95934da15eff351f97e82bc1b1c468c627488fdabe1312fccfec76220a924dc4d67596c73a2641b6", 0x8b, 0x7fffffff}, {0x0, 0x0, 0x1}, {&(0x7f0000000dc0), 0x0, 0x5}, {&(0x7f0000000e80)}], 0x2b080, 0x0) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000002b40)) 22:19:46 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000001980)='/dev/snapshot\x00', 0x42, 0x0) 22:19:46 executing program 2: fsopen(&(0x7f0000000200)='nfs\x00', 0x0) [ 578.397110][T12012] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 578.420609][T12012] EXT4-fs (loop1): mount failed 22:19:46 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000380)='/dev/video#\x00', 0xfff, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000001c0)={0x0, 0x0, 0x0, @stepwise}) 22:19:46 executing program 5: r0 = socket(0x29, 0x2, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20008000) 22:19:47 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 22:19:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:47 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:19:47 executing program 2: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x119ac0, 0x0) 22:19:47 executing program 5: clone3(&(0x7f0000001540)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:19:47 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) [ 579.471027][T12033] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 579.487148][T12033] EXT4-fs (loop1): mount failed 22:19:48 executing program 3: socketpair(0x22, 0x0, 0x2, &(0x7f0000002340)) 22:19:48 executing program 2: r0 = socket(0x29, 0x2, 0x0) getpeername$l2tp6(r0, 0x0, 0x0) 22:19:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:48 executing program 3: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x5}, &(0x7f0000000100)={0x0, r0+10000000}, 0x0) 22:19:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f00000001c0)) [ 580.442556][T12055] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 22:19:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000100)={0x11, 0xf, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) [ 580.542384][T12055] EXT4-fs (loop1): mount failed 22:19:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0xb, 0x4) [ 581.381383][T12069] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 581.500514][T12069] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 581.541788][T12069] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 22:19:50 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:19:50 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='b', 0x1, r0) 22:19:50 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8904, &(0x7f0000000140)) 22:19:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 22:19:50 executing program 5: io_setup(0x7, &(0x7f0000000800)) mlock(&(0x7f0000002000/0x2000)=nil, 0x2000) [ 581.589952][T12069] EXT4-fs (loop1): mount failed 22:19:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 581.881648][T12082] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 22:19:50 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c"], 0x9c}}, 0x0) 22:19:50 executing program 3: rt_sigaction(0x1b, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000180)) 22:19:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg(r0, &(0x7f0000002c00)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, 0x0}, 0x20040180) 22:19:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) [ 582.504811][T12090] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 582.666902][T12090] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 22:19:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x0, 0x1040, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x40) [ 582.780045][T12090] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 582.875911][T12090] EXT4-fs (loop1): mount failed 22:19:51 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/slabinfo\x00', 0x0, 0x0) 22:19:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:19:51 executing program 4: futex(0x0, 0x8b, 0x0, 0x0, &(0x7f00000002c0), 0x0) 22:19:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f0000000580)={0x0}}, 0x0) 22:19:52 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x201) write$FUSE_CREATE_OPEN(r0, &(0x7f00000004c0)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7}}}}, 0xa0) 22:19:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) read$FUSE(r0, &(0x7f0000002580)={0x2020}, 0x2020) [ 583.772496][T12111] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 22:19:52 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101, 0x0) write$snapshot(r0, 0x0, 0x0) [ 583.900385][T12111] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 583.959908][T12111] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 584.080217][T12111] EXT4-fs (loop1): mount failed 22:19:52 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000940)='/dev/nvram\x00', 0x0, 0x0) clone3(&(0x7f0000000640)={0x202200800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 22:19:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:52 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0x23, 0x0, 0x0) 22:19:52 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:19:53 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) [ 584.876865][T12138] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 584.908840][T12138] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 584.952544][T12138] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 585.020901][T12138] EXT4-fs (loop1): mount failed 22:19:53 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) 22:19:53 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x40004) 22:19:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 22:19:54 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000440)='ns/mnt\x00') [ 585.909558][T12160] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 585.944970][T12160] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 22:19:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x7, &(0x7f0000001100)="01906692", 0x4) [ 585.989432][T12160] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 22:19:54 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x147100, 0x0) [ 586.111322][T12160] EXT4-fs (loop1): mount failed 22:19:54 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:19:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f000000ac80), 0x1c, 0x0) 22:19:54 executing program 4: r0 = socket(0x15, 0x5, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x4000000) 22:19:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:55 executing program 3: r0 = fsopen(&(0x7f0000000140)='cgroup\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) 22:19:55 executing program 5: r0 = syz_io_uring_setup(0x57cf, &(0x7f0000000000), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000140)={0x0, 0x0, 0x0, [], [{}, {}]}, 0x2) 22:19:55 executing program 2: io_setup(0x0, &(0x7f00000001c0)) io_setup(0x7fff, &(0x7f0000000000)) [ 587.313139][T12186] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 22:19:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10080, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6804}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:19:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {0x0, r2}}, 0x18) [ 587.484792][T12186] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 587.513764][T12186] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 587.543582][T12186] EXT4-fs (loop1): mount failed 22:19:56 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x42931, 0xffffffffffffffff, 0x2000000) 22:19:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:56 executing program 5: r0 = socket(0x15, 0x5, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, 0x0) 22:19:56 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:19:56 executing program 2: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x42931, 0xffffffffffffffff, 0x0) [ 588.376836][ T8827] Bluetooth: hci3: command 0x0406 tx timeout 22:19:56 executing program 3: r0 = socket(0x15, 0x5, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x20) [ 589.540292][T12214] EXT4-fs: failed to create workqueue [ 589.546051][T12214] EXT4-fs (loop1): mount failed 22:19:58 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0x400448c9, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cba8cbe8"}, 0x0, 0x0, @userptr}) 22:19:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40000140) 22:19:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:19:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=@raw=[@ldst], &(0x7f0000000080)='syzkaller\x00', 0x6, 0xb9, &(0x7f00000000c0)=""/185, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:19:59 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:19:59 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa) syz_io_uring_setup(0xe0, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000200)) 22:19:59 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x89a1, 0x0) [ 591.427094][T12242] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 591.458695][T12242] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 591.478963][T12242] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 591.508903][T12242] EXT4-fs (loop1): mount failed 22:20:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000040)={0x0, 0x4, 0x2, 0x0, 0x0, [@private2, @remote]}, 0x28) 22:20:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 592.512817][T12262] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 592.545820][T12262] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 592.607388][T12262] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 592.630947][T12262] EXT4-fs (loop1): mount failed 22:20:01 executing program 2: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x1f}, &(0x7f0000000180)={0x77359400}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 22:20:01 executing program 3: socket(0x15, 0x5, 0x81) 22:20:01 executing program 4: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xb1302c00}, 0x8) 22:20:01 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:01 executing program 5: bind$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @bcast, 0x1}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x0, 0x0, 0xa6, 0x8001]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000810) 22:20:01 executing program 3: r0 = timerfd_create(0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000100)={{}, {0x0, 0x989680}}, 0x0) 22:20:01 executing program 4: futex(&(0x7f0000000240), 0xa, 0x0, 0x0, 0x0, 0x1) 22:20:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8}]}, 0x62}}, 0x0) [ 593.451281][T12280] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 593.537208][T12280] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 593.613589][T12280] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 593.707535][T12280] EXT4-fs (loop1): mount failed 22:20:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) 22:20:02 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x4, 0x9, 0x11, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 22:20:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:02 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c000000ed03"], 0x9c}}, 0x0) 22:20:02 executing program 4: syz_open_dev$vim2m(&(0x7f0000000280)='/dev/video#\x00', 0x0, 0x2) 22:20:02 executing program 3: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) [ 594.591711][T12304] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 594.759870][T12304] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 22:20:03 executing program 5: syz_read_part_table(0xf0a, 0x0, 0x0) [ 594.867316][T12304] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 22:20:03 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) [ 594.989513][T12304] EXT4-fs (loop1): mount failed 22:20:03 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:03 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000009, 0x13, r0, 0x8000000) 22:20:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:03 executing program 3: futex(0x0, 0x8c, 0x0, 0x0, &(0x7f0000000740), 0x0) [ 595.405456][T12318] Dev loop5: unable to read RDB block 7 [ 595.411187][T12318] loop5: unable to read partition table [ 595.481042][T12318] loop5: partition table beyond EOD, truncated [ 595.487830][T12318] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 22:20:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141440e0", 0x0, 0x9}, 0x28) [ 595.666211][T12318] Dev loop5: unable to read RDB block 7 [ 595.671961][T12318] loop5: unable to read partition table [ 595.699635][T12318] loop5: partition table beyond EOD, truncated [ 595.706426][T12318] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 595.925803][T12332] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 595.949922][T12332] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 595.995105][T12332] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 22:20:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000040)=""/110, &(0x7f00000000c0)=0x6e) 22:20:04 executing program 5: socketpair(0x22, 0x0, 0x0, &(0x7f0000000040)) [ 596.094807][T12332] EXT4-fs (loop1): mount failed 22:20:04 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:05 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '\x00'}, 0x6) 22:20:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x0, 0x100, 0x0, 0x8001]}]}, 0x28}}, 0x0) [ 597.111369][T12352] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 597.138929][T12352] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 22:20:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x0, 0x0, 0x0, 0x0]}]}, 0x28}}, 0x0) [ 597.249424][T12352] EXT4-fs (loop1): mount failed 22:20:05 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x0, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 22:20:06 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:06 executing program 4: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x0, r0+10000000}, 0x0) 22:20:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x100}}, 0x18) 22:20:06 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x0, 0x0) 22:20:06 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 22:20:06 executing program 2: delete_module(&(0x7f0000000000)='\x00', 0x200) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) [ 598.392114][T12373] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 598.517190][T12373] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 598.617470][T12373] EXT4-fs (loop1): mount failed 22:20:07 executing program 4: prctl$PR_SET_CHILD_SUBREAPER(0x1c, 0x0) 22:20:07 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/162) 22:20:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x5, &(0x7f0000000000)=0xb, 0x4) 22:20:07 executing program 2: r0 = socket(0x11, 0x2, 0x0) getsockname$l2tp6(r0, 0x0, &(0x7f0000000040)) 22:20:07 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:07 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 599.568001][T12398] EXT4-fs error (device loop1): ext4_quota_enable:6370: comm syz-executor.1: Bad quota inode # 3 [ 599.680724][T12398] EXT4-fs warning (device loop1): ext4_enable_quotas:6410: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 22:20:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x200800, &(0x7f0000001580)={[{@quota='quota'}], [{@dont_hash='dont_hash'}]}) [ 599.848517][T12398] EXT4-fs (loop1): mount failed 22:20:08 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000500)={&(0x7f0000000380), 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x14, 0x453, 0x0, 0x0, 0x0, "9e"}, 0x14}}, 0x0) 22:20:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c000000ed03"], 0x9c}}, 0x0) 22:20:08 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) fsmount(r0, 0x0, 0x0) 22:20:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 600.281289][T12414] jfs: Unrecognized mount option "dont_hash" or missing value 22:20:08 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 600.410921][T12414] jfs: Unrecognized mount option "dont_hash" or missing value [ 600.649223][ T32] audit: type=1107 audit(1611094809.069:6): pid=12423 uid=0 auid=0 ses=4 subj==unconfined msg='ž' [ 600.720199][ T32] audit: type=1107 audit(1611094809.089:7): pid=12423 uid=0 auid=0 ses=4 subj==unconfined msg='ž' 22:20:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x0, 0x0, 0x0, 0x8001]}]}, 0x28}}, 0x0) [ 600.824866][T12428] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated 22:20:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x28, 0x0, 0xb, 0x401, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0x11, 0x1, '[{%)&$\\[{@/-\x00'}]}, 0x28}}, 0x0) 22:20:09 executing program 3: socketpair(0x2b, 0x1, 0x9, &(0x7f0000000000)) 22:20:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) [ 600.982478][T12428] EXT4-fs (loop1): get root inode failed [ 600.988441][T12428] EXT4-fs (loop1): mount failed 22:20:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 601.704707][T12445] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities 22:20:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000040)={'nr0\x00', @ifru_map}) 22:20:10 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:10 executing program 4: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 601.844930][T12450] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 601.920939][T12450] EXT4-fs (loop1): get root inode failed [ 601.925595][T12445] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 601.927074][T12450] EXT4-fs (loop1): mount failed 22:20:10 executing program 3: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x6}, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) 22:20:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) 22:20:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/189, 0xbd}], 0x1043, &(0x7f0000000380)=""/110, 0x6e}, 0x0) 22:20:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2c}, 0x1, 0x0, 0x5a01}, 0x0) [ 602.874127][T12476] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities 22:20:11 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 603.137381][T12479] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 603.273593][T12479] EXT4-fs (loop1): get root inode failed [ 603.279354][T12479] EXT4-fs (loop1): mount failed 22:20:11 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000014c0)=[{&(0x7f00000004c0)="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", 0x200}]) 22:20:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:20:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) 22:20:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa2584c1481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x8000000, {{}, 0x4c1}}}}}}}, 0x0) [ 603.923743][T12497] Dev loop4: unable to read RDB block 1 [ 603.929493][T12497] loop4: unable to read partition table [ 603.963366][T12497] loop4: partition table beyond EOD, truncated [ 603.969680][T12497] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 604.010441][T12500] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 604.255037][T12513] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 604.339070][T12510] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 604.368190][T12510] EXT4-fs (loop1): get root inode failed [ 604.374493][T12510] EXT4-fs (loop1): mount failed 22:20:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') fchdir(r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 22:20:13 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:20:13 executing program 5: clone(0x5fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 22:20:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) 22:20:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 605.362814][T12537] EXT4-fs (loop2): couldn't mount as ext2 due to feature incompatibilities [ 605.388904][T12536] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated 22:20:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x18481, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa2584c1481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x8000000, {{}, 0x4c1}}}}}}}, 0x0) [ 605.495396][T12536] EXT4-fs (loop1): get root inode failed [ 605.501138][T12536] EXT4-fs (loop1): mount failed 22:20:14 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f00000002c0)={'sit0\x00', @ifru_hwaddr=@local}) 22:20:14 executing program 5: mlockall(0x2) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 22:20:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) 22:20:14 executing program 3: syz_io_uring_setup(0x5f7a, &(0x7f0000000640)={0x0, 0x4a, 0x8}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f00000006c0), &(0x7f0000000700)) [ 605.924270][T12550] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 22:20:14 executing program 4: socketpair(0x2, 0x3, 0x6, &(0x7f0000000480)) 22:20:14 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000180)={0x0, 0x0, [], {0x0, @reserved}}) [ 606.508361][T12564] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 606.521989][T12564] EXT4-fs (loop1): get root inode failed [ 606.528011][T12564] EXT4-fs (loop1): mount failed 22:20:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) 22:20:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:15 executing program 3: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x44001, 0x0) 22:20:15 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000180)={0x1ff}) 22:20:15 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:15 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000280)) timer_gettime(0x0, &(0x7f00000000c0)) 22:20:15 executing program 3: socket(0x22, 0x0, 0x3) [ 607.497043][T12582] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 607.548430][T12582] EXT4-fs (loop1): get root inode failed [ 607.554432][T12582] EXT4-fs (loop1): mount failed 22:20:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) 22:20:16 executing program 4: syz_io_uring_setup(0x5f7a, &(0x7f0000000640)={0x0, 0x0, 0x8}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f00000006c0), &(0x7f0000000700)) 22:20:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:16 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}, 0x100}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 22:20:16 executing program 3: mlockall(0x2) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 22:20:17 executing program 3: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x32141) [ 608.670499][T12612] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 608.687858][T12612] EXT4-fs (loop1): get root inode failed [ 608.694281][T12612] EXT4-fs (loop1): mount failed 22:20:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) 22:20:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, 0x0) 22:20:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:17 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:17 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}, 0x100}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 22:20:17 executing program 3: pselect6(0x40, &(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)={0x0, 0x8}, &(0x7f0000000e80)={0x0, 0x3938700}, &(0x7f0000000f00)={&(0x7f0000000ec0)={[0x2]}, 0x8}) [ 609.436573][T12626] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 609.545266][T12626] EXT4-fs (loop1): get root inode failed [ 609.551305][T12626] EXT4-fs (loop1): mount failed 22:20:18 executing program 4: syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 22:20:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) 22:20:18 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={[], 0x10}, 0x100}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 22:20:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:18 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x2) [ 610.401048][T12652] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 610.556528][T12652] EXT4-fs (loop1): get root inode failed [ 610.563097][T12652] EXT4-fs (loop1): mount failed 22:20:19 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) fremovexattr(r0, &(0x7f0000000040)=@known='trusted.overlay.opaque\x00') 22:20:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, &(0x7f0000000100)) 22:20:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 611.538376][T12676] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated 22:20:20 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:20 executing program 3: pselect6(0x40, &(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)={0x3}, &(0x7f0000000e80)={0x0, 0x3938700}, &(0x7f0000000f00)={&(0x7f0000000ec0)={[0x2]}, 0x8}) 22:20:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) [ 611.684438][T12676] EXT4-fs (loop1): get root inode failed [ 611.690689][T12676] EXT4-fs (loop1): mount failed 22:20:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 22:20:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:20 executing program 3: syz_io_uring_setup(0x56fb, &(0x7f0000000000)={0x0, 0x0, 0x6}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_setup(0x672b, 0x0) socket$nl_route(0x10, 0x3, 0x0) 22:20:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:20 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 22:20:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 22:20:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 612.897222][T12707] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated 22:20:21 executing program 3: openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000, 0x0) [ 613.086049][T12707] EXT4-fs (loop1): get root inode failed [ 613.092201][T12707] EXT4-fs (loop1): mount failed 22:20:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:22 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 22:20:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 22:20:22 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x2, 0x0) 22:20:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 614.059071][T12728] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 614.143410][T12728] EXT4-fs (loop1): get root inode failed [ 614.150244][T12728] EXT4-fs (loop1): mount failed 22:20:22 executing program 4: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}], 0x0, &(0x7f0000010300)) 22:20:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000100)) 22:20:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:23 executing program 3: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740)='NLBL_MGMT\x00') 22:20:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 614.919298][T12745] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing [ 615.060689][T12748] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 615.124866][T12745] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing [ 615.153094][T12749] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 615.234106][T12749] EXT4-fs (loop1): get root inode failed [ 615.240404][T12749] EXT4-fs (loop1): mount failed 22:20:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x14, 0x0, 0xb0d}, 0x14}}, 0x0) 22:20:24 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:24 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/consoles\x00', 0x0, 0x0) connect$pppl2tp(r0, 0x0, 0x0) 22:20:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000100)) 22:20:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 616.276998][T12774] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:24 executing program 3: syz_mount_image$reiserfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 22:20:24 executing program 4: socketpair(0x8, 0x0, 0x0, &(0x7f0000000700)) [ 616.439505][T12777] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 616.585129][T12777] EXT4-fs (loop1): get root inode failed [ 616.591910][T12777] EXT4-fs (loop1): mount failed 22:20:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000100)) 22:20:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:25 executing program 4: socketpair(0x11, 0xa, 0x1, &(0x7f0000000000)) 22:20:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 617.287789][T12798] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 617.549739][T12804] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 617.672711][T12804] EXT4-fs (loop1): get root inode failed [ 617.679648][T12804] EXT4-fs (loop1): mount failed 22:20:26 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000500)='/dev/urandom\x00', 0x0, 0x0) 22:20:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000100)) 22:20:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:26 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "50d015dc"}, 0x0, 0x0, @userptr}) 22:20:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 618.548883][T12820] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x7b, 0x11, 0x3e}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 618.861890][T12830] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 618.881226][T12830] EXT4-fs (loop1): get root inode failed [ 618.892419][T12830] EXT4-fs (loop1): mount failed 22:20:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000100)) 22:20:27 executing program 4: clock_getres(0x5, &(0x7f0000000480)) 22:20:27 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 619.663827][T12844] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:28 executing program 3: syz_open_dev$ndb(&(0x7f00000007c0)='/dev/nbd#\x00', 0x0, 0x400000) 22:20:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000100)) [ 620.254704][T12859] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 620.271544][T12853] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 620.444171][T12853] EXT4-fs (loop1): get root inode failed [ 620.450169][T12853] EXT4-fs (loop1): mount failed 22:20:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x0, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:29 executing program 4: syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[{&(0x7f0000000240)='pUp=\f', 0x5, 0x4}, {&(0x7f0000000380)='c', 0x1}], 0x0, 0x0) 22:20:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180), 0x0, 0x400}], 0x0, &(0x7f0000000100)) 22:20:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x7b, 0x11, 0x3b}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 621.186559][T12879] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:29 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x1}}) 22:20:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180), 0x0, 0x400}], 0x0, &(0x7f0000000100)) [ 621.787104][T12889] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 621.793892][T12889] EXT4-fs (loop1): mount failed 22:20:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:30 executing program 3: setgroups(0x53, &(0x7f0000000000)=[0xee00, 0xee00, 0x0, 0xee00]) 22:20:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 622.172096][T12901] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:31 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x0, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:31 executing program 4: ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 22:20:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180), 0x0, 0x400}], 0x0, &(0x7f0000000100)) [ 622.867052][T12910] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 622.873780][T12910] EXT4-fs (loop1): mount failed 22:20:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:31 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[@ANYRES16], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4f0a, 0x0) 22:20:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 623.453382][T12921] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x7b, 0x11, 0x49}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 623.711752][T12931] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 623.718544][T12931] EXT4-fs (loop1): mount failed 22:20:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x0, &(0x7f0000000100)) [ 624.216662][ T2969] Bluetooth: hci4: command 0x0406 tx timeout 22:20:32 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:32 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x0, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:33 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8f}]}) [ 624.716996][T12945] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:33 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x0, 0x1, 0x1, 0x0, 0x8}}) 22:20:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x0, &(0x7f0000000100)) [ 624.997235][T12949] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated [ 625.112452][T12949] EXT4-fs (loop1): get root inode failed [ 625.118501][T12949] EXT4-fs (loop1): mount failed 22:20:33 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 625.617443][T12967] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:34 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x12, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b20fc01b"}}) 22:20:34 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, 0x0) 22:20:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x0, &(0x7f0000000100)) [ 626.335272][T12975] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated 22:20:34 executing program 5: r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 626.452031][T12975] EXT4-fs (loop1): get root inode failed [ 626.458300][T12975] EXT4-fs (loop1): mount failed 22:20:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x7b, 0x11, 0x32}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 626.806786][T12988] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:35 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x0, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:35 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000240)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 22:20:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000000", 0x4c, 0x400}], 0x0, &(0x7f0000000100)) 22:20:35 executing program 5: r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:35 executing program 4: socket(0x23, 0x0, 0x8) [ 628.075052][T13015] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 628.083731][T13015] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 628.125159][T13007] EXT4-fs error (device loop1): ext4_fill_super:4958: inode #2: comm syz-executor.1: iget: root inode unallocated 22:20:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000000", 0x4c, 0x400}], 0x0, &(0x7f0000000100)) 22:20:36 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x25) [ 628.323877][T13007] EXT4-fs (loop1): get root inode failed [ 628.329738][T13007] EXT4-fs (loop1): mount failed 22:20:36 executing program 3: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0xffffffff}, 0x8) 22:20:36 executing program 5: r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 628.909548][T13031] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 628.918842][T13031] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 22:20:37 executing program 4: syz_io_uring_setup(0x56fb, &(0x7f0000000000), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) 22:20:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) [ 629.398450][T13041] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 629.409990][T13041] EXT4-fs (loop1): group descriptors corrupted! 22:20:38 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x0, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000000", 0x4c, 0x400}], 0x0, &(0x7f0000000100)) 22:20:38 executing program 5: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:38 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00'}) 22:20:38 executing program 4: r0 = syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3}, 0x1f) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) [ 629.998479][T13058] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 630.008478][T13058] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 630.107661][T13065] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 630.118715][T13065] EXT4-fs (loop1): group descriptors corrupted! 22:20:38 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0xe4d6) 22:20:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:38 executing program 5: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000", 0x59, 0x400}], 0x0, &(0x7f0000000100)) 22:20:39 executing program 4: r0 = syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3}, 0x1f) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) [ 630.930396][T13088] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 630.941480][T13088] EXT4-fs (loop1): group descriptors corrupted! [ 631.200813][T13095] EXT4-fs (loop2): unsupported inode size: 0 [ 631.207441][T13095] EXT4-fs (loop2): blocksize: 1024 22:20:39 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d16, &(0x7f0000000040)) 22:20:39 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x0, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:39 executing program 5: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000", 0x59, 0x400}], 0x0, &(0x7f0000000100)) 22:20:40 executing program 4: r0 = syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3}, 0x1f) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) [ 632.021710][T13112] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 632.031866][T13112] EXT4-fs (loop1): group descriptors corrupted! 22:20:40 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) [ 632.157554][T13122] EXT4-fs (loop2): unsupported inode size: 0 [ 632.164211][T13122] EXT4-fs (loop2): blocksize: 1024 22:20:40 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000", 0x59, 0x400}], 0x0, &(0x7f0000000100)) 22:20:40 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x3, &(0x7f00000005c0)=[{0x3, 0x0, 0x7}, {0x0, 0x1f}, {}]}) 22:20:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:41 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000600)='./file1\x00', 0x240, 0x84) [ 633.031459][T13135] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 633.041693][T13135] EXT4-fs (loop1): group descriptors corrupted! [ 633.146973][T13139] EXT4-fs (loop2): unsupported inode size: 0 [ 633.154046][T13139] EXT4-fs (loop2): blocksize: 1024 22:20:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x0, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 22:20:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008", 0x5f, 0x400}], 0x0, &(0x7f0000000100)) 22:20:42 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:42 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, 0x0) [ 634.008972][T13157] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 634.019098][T13157] EXT4-fs (loop1): group descriptors corrupted! 22:20:42 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000001c0)={0x18, 0x2, {0x0, @local}}, 0x1e) [ 634.208662][T13161] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 634.217689][T13161] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 22:20:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x7b, 0x11, 0x37}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:20:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008", 0x5f, 0x400}], 0x0, &(0x7f0000000100)) 22:20:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:43 executing program 4: epoll_create1(0x0) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = getpgrp(0x0) sched_setparam(r0, 0x0) sched_getscheduler(0x0) r1 = perf_event_open(0x0, r0, 0x200001, 0xffffffffffffffff, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x350) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {}, [], {}, [{0x8, 0x6, 0xee00}, {0x8, 0x2}], {0x10, 0x2}}, 0x34, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x3, 0x9, 0x9, 0x20, 0x0, 0xfffffffffffffffe, 0x45102, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000440), 0x8}, 0x40102, 0x9c, 0x6, 0x6, 0xcfc, 0x19b5, 0x1000}, 0xffffffffffffffff, 0x10, r1, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000100)=""/241, 0xffd1) [ 635.158873][T13179] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 635.167599][T13179] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 635.396827][T13183] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 635.407816][T13183] EXT4-fs (loop1): group descriptors corrupted! 22:20:44 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x0, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008", 0x5f, 0x400}], 0x0, &(0x7f0000000100)) 22:20:44 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 22:20:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 636.127140][T13189] overlayfs: failed to resolve 'file0 ': -2 [ 636.254412][T13196] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 636.262724][T13196] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 22:20:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000", 0x62, 0x400}], 0x0, &(0x7f0000000100)) [ 636.512832][T13203] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 636.522968][T13203] EXT4-fs (loop1): group descriptors corrupted! 22:20:45 executing program 3: syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x8082) 22:20:45 executing program 4: epoll_create1(0x0) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = getpgrp(0x0) sched_setparam(r0, 0x0) sched_getscheduler(0x0) r1 = perf_event_open(0x0, r0, 0x200001, 0xffffffffffffffff, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x350) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {}, [], {}, [{0x8, 0x6, 0xee00}, {0x8, 0x2}], {0x10, 0x2}}, 0x34, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x3, 0x9, 0x9, 0x20, 0x0, 0xfffffffffffffffe, 0x45102, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000440), 0x8}, 0x40102, 0x9c, 0x6, 0x6, 0xcfc, 0x19b5, 0x1000}, 0xffffffffffffffff, 0x10, r1, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000100)=""/241, 0xffd1) 22:20:45 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 636.928134][T13212] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 636.936918][T13212] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 22:20:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000", 0x62, 0x400}], 0x0, &(0x7f0000000100)) [ 637.825102][T13226] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 637.838401][T13226] EXT4-fs (loop1): group descriptors corrupted! 22:20:46 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x0, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:46 executing program 3: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="02", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x46042, 0x0) sendfile(r1, r2, 0x0, 0x200fff) 22:20:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 638.249453][T13232] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 638.258416][T13232] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 22:20:46 executing program 4: epoll_create1(0x0) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = getpgrp(0x0) sched_setparam(r0, 0x0) sched_getscheduler(0x0) r1 = perf_event_open(0x0, r0, 0x200001, 0xffffffffffffffff, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x350) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {}, [], {}, [{0x8, 0x6, 0xee00}, {0x8, 0x2}], {0x10, 0x2}}, 0x34, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x3, 0x9, 0x9, 0x20, 0x0, 0xfffffffffffffffe, 0x45102, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000440), 0x8}, 0x40102, 0x9c, 0x6, 0x6, 0xcfc, 0x19b5, 0x1000}, 0xffffffffffffffff, 0x10, r1, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000100)=""/241, 0xffd1) 22:20:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000", 0x62, 0x400}], 0x0, &(0x7f0000000100)) [ 638.807062][T13247] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 638.816746][T13247] EXT4-fs (loop1): group descriptors corrupted! 22:20:47 executing program 3: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002100)='/dev/nvme-fabrics\x00', 0x0, 0x0) getresuid(&(0x7f00000020c0), &(0x7f0000004180), &(0x7f00000041c0)) 22:20:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 639.548697][T13258] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 639.557645][T13258] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 22:20:48 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x0, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:48 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00'}) 22:20:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b000000000100000800080000000000", 0x64, 0x400}], 0x0, &(0x7f0000000100)) [ 640.009116][T13265] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 640.018946][T13265] EXT4-fs (loop1): group descriptors corrupted! 22:20:48 executing program 4: pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000a, 0xffffffffffffffff) 22:20:48 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:49 executing program 3: syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000340)="b0", 0x1, 0x80000000}], 0x0, 0x0) [ 640.836155][T13278] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 640.845265][T13278] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 22:20:49 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x0, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 641.072340][T13285] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 641.087097][T13285] EXT4-fs (loop1): group descriptors corrupted! 22:20:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:49 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003540)=[{{&(0x7f0000000180)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f0000000740)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x4040800) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 22:20:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b000000000100000800080000000000", 0x64, 0x400}], 0x0, &(0x7f0000000100)) 22:20:50 executing program 3: uname(&(0x7f0000000000)=""/201) 22:20:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 642.104038][T13310] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 642.112495][T13310] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 642.130870][T13313] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 642.141796][T13313] EXT4-fs (loop1): group descriptors corrupted! 22:20:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b000000000100000800080000000000", 0x64, 0x400}], 0x0, &(0x7f0000000100)) 22:20:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:51 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) 22:20:51 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x4, 0x41, "9dc372057720aa88742d9344bf667d4acd49f1660c79548d9b2bbf278f932d58b257896794af4455349ac4f0918885ee2bbfff6da88044a6ddcac1933c27d2aa5a"}) 22:20:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x0, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 643.377788][T13340] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 643.386512][T13340] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 643.430040][T13344] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 643.440510][T13344] EXT4-fs (loop1): group descriptors corrupted! 22:20:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000140), 0x4) 22:20:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:52 executing program 4: openat$6lowpan_enable(0xffffffffffffff9c, 0x0, 0x2, 0x0) 22:20:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65}], 0x0, &(0x7f0000000100)) 22:20:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:53 executing program 3: syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)='c', 0x1}], 0x0, 0x0) [ 644.607380][T13362] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 644.617367][T13362] EXT4-fs (loop1): group descriptors corrupted! [ 644.893393][T13369] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:53 executing program 4: socketpair(0x0, 0x8000e, 0x0, &(0x7f0000000700)) 22:20:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65}], 0x0, &(0x7f0000000100)) 22:20:53 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in, @in={0x2, 0x0, @remote}], 0x3c) [ 645.796584][T13387] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 645.806905][T13387] EXT4-fs (loop1): group descriptors corrupted! 22:20:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:54 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2e0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x7d, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821cb4120df06efab434ad29318f98968979ba0f7f65543d8bc7dfae889ec0eb6cdd0c2fd10d1a4a21439e977b521ba15352854f6ba491839d3b7c4ad25", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x175, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce87"]}]}, 0x2e0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 646.053568][T13395] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:54 executing program 3: syz_open_dev$ndb(&(0x7f0000000240)='/dev/nbd#\x00', 0x0, 0x2002) 22:20:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65}], 0x0, &(0x7f0000000100)) 22:20:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@call={0x7b, 0x11, 0x49}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:20:55 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 647.090074][T13412] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 647.100213][T13412] EXT4-fs (loop1): group descriptors corrupted! 22:20:55 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:55 executing program 4: pselect6(0x40, &(0x7f0000000dc0), &(0x7f0000000e00), 0x0, &(0x7f0000000e80)={0x0, 0x3938700}, &(0x7f0000000f00)={&(0x7f0000000ec0)={[0x2]}, 0x8}) [ 647.260677][T13418] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 22:20:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, 0x0) 22:20:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:56 executing program 3: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000700)) 22:20:56 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000240)={0x0, 0x0, 0x41}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000000)) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:20:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 648.262598][T13437] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 648.272401][T13437] EXT4-fs (loop1): group descriptors corrupted! 22:20:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, 0x0) 22:20:57 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000240)={0x0, 0x0, 0x41}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000000)) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:20:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:57 executing program 3: ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x0, 0x0, 0x898, 0x4}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='devices.list\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000080)={0x0, 0x8, 0x7fff}) openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000100)={0xec91, 0x0, 0xffff, 0x5}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x7) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000140)={0x1, 0x0, [{0x8, 0x3, 0x0, 0x0, @msi={0x80000000, 0x640, 0x9, 0x14a5}}]}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000200)) prctl$PR_GET_KEEPCAPS(0x7) getresuid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) r4 = getgid() getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) syz_mount_image$fuse(&(0x7f0000000240)='fuse\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000000440)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x200}}], [{@fowner_gt={'fowner>', 0xee00}}, {@uid_gt={'uid>'}}, {@dont_measure='dont_measure'}, {@obj_user={'obj_user', 0x3d, 'cgroup.type\x00'}}, {@uid_eq={'uid', 0x3d, r5}}]}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000600)='./file1\x00', 0x240, 0x84) openat$cgroup_int(r0, &(0x7f0000000640)='cgroup.clone_children\x00', 0x2, 0x0) [ 649.431527][T13471] fuse: Unknown parameter 'ma' 22:20:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000180)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080008000000000012", 0x65, 0x400}], 0x0, 0x0) [ 649.479000][T13474] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 649.488945][T13474] EXT4-fs (loop1): group descriptors corrupted! 22:20:57 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000240)={0x0, 0x0, 0x41}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000000)) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 649.532524][T13477] fuse: Unknown parameter 'ma' 22:20:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2cc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19d, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093efa4d04"]}]}, 0x2cc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:58 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x8, 0x0, 0x0) 22:20:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000840)={&(0x7f0000000740), 0xc, &(0x7f0000000800)={0x0}}, 0x0) 22:20:58 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:20:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:20:59 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000140)) [ 650.710459][T13501] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 650.720382][T13501] EXT4-fs (loop1): group descriptors corrupted! 22:20:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:20:59 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000000)) 22:20:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00'}) 22:21:00 executing program 4: pselect6(0x40, &(0x7f00000000c0)={0x1}, 0x0, 0x0, &(0x7f0000000040), 0x0) [ 651.922027][T13519] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 651.931813][T13519] EXT4-fs (loop1): group descriptors corrupted! 22:21:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:00 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/asound/timers\x00', 0x0, 0x0) 22:21:00 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x800c0, 0x0) 22:21:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:00 executing program 4: syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x800, &(0x7f00000005c0)={[{@noattrs='noattrs'}], [{@appraise_type='appraise_type=imasig'}]}) [ 652.730875][T13535] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 652.740542][T13535] EXT4-fs (loop1): group descriptors corrupted! 22:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@call={0x7b, 0x11, 0x49}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:21:01 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x2}) 22:21:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 653.237063][T13542] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "appraise_type=imasig" [ 653.530516][T13542] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "appraise_type=imasig" 22:21:02 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x400, 0x80, 0x3c}, 0x18) socket$caif_stream(0x25, 0x1, 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000003540)=[{{&(0x7f0000000180)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000200)="dead06c72de05ed83b4f85c504db3e720d3daa8c365118c5032cb903197b809b10e47081dcbaba992b1ee21fe2d23cb14ac9b090f112dd7cfb2e0d80f61fdb3b4abdac8acd19b323", 0x48}, {&(0x7f0000000280)="4b5c5a6ef66ca4dad22e3f7294b5ff8fdda7cbabd7168b1f032f500bad4e893809f864cd6072c2d186de85fc894438053dec81a19639c00173f64ad125543e7d124bf9f156695fb4b5e8cf0f5c9775e4e43c0451b39c9ab8f1d6ffbb1bc3", 0x5e}, {&(0x7f00000003c0)}, {&(0x7f0000000480)="5a7588a4117c22206dae6d7e294d30640c16ce68767c1f79706772a6aa80644aab403cc26d1d0fb05d90286dec35fdfbcf78cf85e24738393bbe84dc6504106f60360e9a1f83de2dba5a6d2f2ed842037b84cf3cd5ecc8347d588d7b52b3e18bbca854f37aab43c523ee06", 0x6b}, {&(0x7f0000000500)="e24fcfb02999ceaa04bfcdaaa17cd7939abc63241071969dfdd27b91e938bc74ec8b807000b811718a6f02564d6347a43762a12bbf59cc9cfc73cde71cc64ae74eabd496a11c826a6c6890c17ac8dee79b5518f0f9bb8bbf7fc0ebbed45fb0c2d92fe7973d0628282fff10ca8be6db8203ebeb57e20e0ff73304132d88f22120673729a3c4ecf862e745775cf2d44e305d40aca4e894eae47c88c63ebca8e268b2333047cd3ae570da268143c9b1001dfb3e", 0xb2}, {&(0x7f00000005c0)="c6", 0x1}], 0x6, &(0x7f00000007c0)=[{0x10, 0x10f, 0x8}, {0xb8, 0x11, 0x6, "068a6928a3a405e0bc3f28fab10ffc5b072726b3978b4fd76b94d7ccb34537328c47b151c23962a74e6e8965fc87a0a337319a07ab20aaa179f80b23db9ef4e934e4e7d95f41ef2a9f7b3444e76ccc67afc2a0106f8cdc9cbb74eabc809189aa58368066abc02cbbcd0295d9ae91802376284a2ce036d7e6b1aa526cdaabed97e889428e391421a722a23333ca52a1d95670c713ee3acdffe8e4d9a23a9048c0a9391a9a"}, {0xa0, 0x113, 0x3f, "aec3f6978c614b11edf10a8be75df683342710e462eed1a3cb486095a23d1ed43869175de897a3ceaad6e8cd186cbaf527d5e2b3c43f5faa442d761ce508fff4019819d14b73a662ec5bf79a14033ba860177367c4051b74f66fc554b6dfd19e85bd43fe628ffd1484399698b685e540433af09a49624bf217cc884baaa2b0ddc0b50fd885e882c4963e18d27bd50c2d"}], 0x168}}], 0x1, 0x4040800) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) 22:21:02 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) 22:21:02 executing program 4: io_setup(0x2, &(0x7f0000000140)) io_setup(0x8, &(0x7f0000000000)=0x0) io_destroy(r0) io_setup(0x7, &(0x7f00000004c0)) 22:21:02 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 654.258329][T13563] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 654.269022][T13563] EXT4-fs (loop1): group descriptors corrupted! 22:21:03 executing program 3: pselect6(0x40, &(0x7f0000000dc0)={0x81}, 0x0, 0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0), 0x8}) 22:21:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000140)) [ 655.400320][T13591] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 655.410570][T13591] EXT4-fs (loop1): group descriptors corrupted! 22:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 22:21:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:04 executing program 3: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000840)) 22:21:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_IBPORT={0x5}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}}, 0x0) 22:21:04 executing program 2: syz_usb_connect$hid(0xe5f293f7331c0a39, 0x36, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56a, 0x22, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) [ 656.541427][T13610] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 656.551673][T13610] EXT4-fs (loop1): group descriptors corrupted! 22:21:05 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:05 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000006580)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 22:21:05 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, 0x0) 22:21:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x7b, 0x11, 0x9c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:21:06 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:21:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 657.738001][T13629] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 657.749103][T13629] EXT4-fs (loop1): group descriptors corrupted! 22:21:06 executing program 2: socketpair(0x2, 0x3, 0x6, &(0x7f0000000700)) 22:21:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:06 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73c7aea5"}}) 22:21:07 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f00000002c0)) 22:21:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 659.209940][T13646] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 659.220143][T13646] EXT4-fs (loop1): group descriptors corrupted! 22:21:08 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x80, 0x3c}, 0x18) socket$caif_stream(0x25, 0x1, 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000b00)=[{0x0}], 0x1, &(0x7f0000000b40)=[{0x50, 0x110, 0x0, "87d3af0cfea503942d54cba6c6e814abb62431796e6ae5a469b11651ec68034a24c5c97d7dd6edbd5b3ca293ed9e7ad299f4948203b46210d5"}, {0x10, 0x109, 0x7}, {0x20, 0x0, 0x1ff, "e8a26fb749a353cdee0b35f6"}, {0x18, 0x0, 0x0, "f5aac9aa144e8fcb"}, {0x18, 0x0, 0x2, "9c"}, {0x10}], 0xc0}}], 0x1, 0x4040800) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 22:21:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:08 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 660.606945][T13664] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x2}]}) 22:21:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2082, 0x0) write$capi20(r0, &(0x7f0000000280)={0x10}, 0x10) 22:21:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:09 executing program 4: socketpair(0x25, 0x0, 0x7, &(0x7f0000000000)) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000cc0)={0x1f, 0x0, @fixed={[], 0x10}, 0x9}, 0xe) 22:21:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) [ 661.599827][T13690] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:10 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000380)) 22:21:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x12c, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x12c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:10 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 22:21:11 executing program 4: memfd_create(&(0x7f0000000000)=')@%\x00', 0x6) 22:21:11 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:11 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x40, 0x41) [ 662.880402][T13705] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x12c, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x12c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:11 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) 22:21:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x7b, 0x11, 0x32}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:21:12 executing program 3: r0 = getpid() process_vm_readv(r0, &(0x7f0000001580)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f0000001840)=[{&(0x7f0000001600)=""/16, 0x10}, {0x0}], 0x2, 0x0) 22:21:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x12c, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x12c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:12 executing program 4: syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) [ 664.154016][T13728] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x7b, 0x11, 0x9e}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:21:12 executing program 3: r0 = syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 22:21:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:13 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x18e, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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"]}]}, 0x2bc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:13 executing program 2: syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x80000000}], 0x0, 0x0) 22:21:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6erspan0\x00'}) [ 665.302677][T13756] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:14 executing program 4: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f00000007c0)={0x11, 0x15, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 22:21:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{0x3}]}) 22:21:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x18e, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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"]}]}, 0x2bc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:14 executing program 3: open$dir(&(0x7f0000000040)='./file0\x00', 0x385400, 0x0) 22:21:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 666.667550][T13787] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:15 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYRES16, @ANYBLOB="f718440041d2172c"], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4f0a, 0x0) 22:21:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:15 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x18e, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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"]}]}, 0x2bc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:15 executing program 3: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, 0x0, 0x0) 22:21:15 executing program 4: syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[{&(0x7f0000000340)="b0", 0x1, 0x80000000}, {&(0x7f0000000380)='c', 0x1}], 0x0, 0x0) [ 667.829220][T13809] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x18e, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic]}]}, 0x2bc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:16 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x84800, 0x0) 22:21:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 22:21:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:16 executing program 2: io_setup(0x400, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000700)=[0x0]) 22:21:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}], 0x10) 22:21:17 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x18e, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic]}]}, 0x2bc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:17 executing program 4: syz_mount_image$fuse(&(0x7f0000000240)='fuse\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 669.226416][T13834] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 669.627714][T13843] fuse: Bad value for 'fd' [ 669.641951][T13843] fuse: Bad value for 'fd' 22:21:18 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xa, 0x1, &(0x7f00000000c0)=@raw=[@generic], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:21:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:18 executing program 3: r0 = syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, 0x0, 0x0) clone(0x2030900, 0x0, 0x0, 0x0, 0x0) clone(0x20001400, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:21:18 executing program 4: r0 = syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) socket$alg(0x26, 0x5, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x4, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x8}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 22:21:18 executing program 2: syz_genetlink_get_family_id$nbd(&(0x7f0000000680)='nbd\x00') [ 670.362777][T13858] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:18 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x18e, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic]}]}, 0x2bc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:19 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="f71844a184e1841e"], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4f0a, 0x0) 22:21:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300", 0x2, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x7b, 0x11, 0x3a}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:21:19 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x196, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce87"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 671.287583][T13887] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:20 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:20 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/vmstat\x00', 0x0, 0x0) getcwd(&(0x7f0000000000)=""/198, 0xc6) 22:21:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300", 0x2, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:20 executing program 2: socketpair(0x28, 0x0, 0x0, &(0x7f0000000700)) 22:21:20 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x196, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce87"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:20 executing program 3: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x3, 0x0) [ 672.404594][T13902] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={0x0}}, 0x20004005) 22:21:21 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000500)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 22:21:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300", 0x2, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:21 executing program 3: socketpair(0xb, 0x0, 0x0, &(0x7f0000000100)) 22:21:21 executing program 2: getresuid(&(0x7f00000002c0), 0x0, 0x0) 22:21:21 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x196, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce87"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 673.738770][T13923] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:22 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 22:21:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:22 executing program 3: syz_open_dev$vim2m(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x2) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') 22:21:22 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)) 22:21:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x19a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e093e"]}]}, 0x2c8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 674.684382][T13945] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:23 executing program 4: socketpair(0x0, 0x80000, 0x0, 0x0) 22:21:23 executing program 3: socketpair(0x1, 0x0, 0x0, &(0x7f0000000240)) 22:21:23 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x45fe, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73c7aea5"}}) 22:21:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:23 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x197, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:24 executing program 4: pselect6(0x40, &(0x7f00000000c0)={0x1}, 0x0, 0x0, 0x0, 0x0) [ 675.738829][T13966] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:24 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000040)=@delchain={0x1ec4, 0x65, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x1e98, 0x2, [@TCA_FW_ACT={0x250, 0x4, [@m_ct={0x104, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_CT_MARK_MASK={0x8}]}, {0xd1, 0x6, "c72010c5704d818b71a5582f335c6691265b1c514ba03708b593384ee94d9774befe461df18c1f4994723c7ed833fc7e6daadaf8b123e0882fbd36a2dc595863a46bcb1fc493ed5abc5424cf1f0c0f2f0f9bbb67f96557361b25ec13d6420f98fa3893ec50634d21871cbdb2adf7e03fff59a8cf4e4507b7d3b66c9a721f6bd3350825ea3e6edbdfb95948b1fa50313f7d93c0357d883aad1345e364ade062d3ed8c2ada79b170c770118c6a00c59df51fffb774733caac5edfe945db4ec76e481b3093090d092a61d51080919"}, {0xc}, {0xc}}}, @m_ct={0xdc, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_LABELS={0x14, 0x7, "f18cfb406dbc71209523f9ecc4e3cac4"}, @TCA_CT_NAT_PORT_MIN={0x6}]}, {0x7d, 0x6, "b4b53b7d55ac61bc37c7d419f8f9b1fdb5363a43fd8ba7a267511e310d70ba0c3fdf542d6f0615f6d9a48aed7349c85d696207b2ef06139fe2c42ce45b784f61e39807b25fe981ae8bdd8a5b2eb9b2e9651a7da3f3e1f191c840997bb595aea42ed7995ae9e90f65c9039a34e2e788d2974b7dd8853880deb8"}, {0xc}, {0xc}}}, @m_bpf={0x6c, 0x0, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}]}, {0xd, 0x6, "c3795fafbd128bebef"}, {0xc}, {0xc}}}]}, @TCA_FW_MASK={0x8}, @TCA_FW_ACT={0x1c3c, 0x4, [@m_tunnel_key={0x100, 0x0, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @multicast1}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0xa9, 0x6, "4c5b8ecc438acfaae0f3a32e1d04a0850a381d72c645257f224d8109ffadae37b8c89a56828ac71b3d8db895a30e609c44017ad0860946ce0bef9fb84eb9887af72945b5fc37e34e7a4e7537b68e91eb3df48c9359e49942d5efd18fe657ba74ba86ed62aa1688a82befd65003d32254228f1af922e9a7163871fc439844e7d9cd14e648e812453038943ec52aad58b706e9ee1c53075da657bef324593feb84a787538a39"}, {0xc}, {0xc}}}, @m_ctinfo={0xc8, 0x0, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8}]}, {0x91, 0x6, "395c9ea04f65a4a52f15dc5e8e4c2d9c3717b6b3c8128ed078e7fc3f932815279742937f5633915bc058cfdebfb19269c53a799bdd25be8a17d54638fee03b7638282f7ad2d619e74e876c3ea060613e51be487cb73e951568246826c8df9a15db4ad2b68850488eef484af904910e44be997568ab3dded6411f481197d53774efb9a028f083579c943a7f0066"}, {0xc}, {0xc}}}, @m_csum={0xa4, 0x0, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x4}, {0x75, 0x6, "48e53ae1ac3d8f8307e198068886e7abbd3058d08f11a7fa8c135cca6d0a0e8e075c13ca361f30ed2ddb5795a2febc21f2e6bdf9f77bbed69d2eadf5f82bfc376a17ef1d15d1774bc05d737332256f6f671f8ec4997119381df2fdd7299410713be1cd432a33cb33cfa45b7d7a47c0b737"}, {0xc}, {0xc}}}, @m_police={0x19cc, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0xc10, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404}], [@TCA_POLICE_PEAKRATE={0x404}], [@TCA_POLICE_PEAKRATE={0x404}]]}, {0xd91, 0x6, "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"}, {0xc}, {0xc}}}]}]}}]}, 0x1ec4}}, 0x0) 22:21:24 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000100)=0x8) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000140)) 22:21:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:24 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '/dev/snd/timer\x00'}, 0x3c, 0x0) 22:21:24 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x197, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 676.559017][T13986] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:21:25 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 22:21:25 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = inotify_init1(0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) 22:21:25 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) sched_setparam(0x0, 0x0) perf_event_open(0x0, 0x0, 0x200001, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) 22:21:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:25 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x197, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x0, 0x0) [ 677.546390][T14007] EXT4-fs (loop1): unsupported descriptor size 0 22:21:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:26 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000180)="88", 0x1) 22:21:26 executing program 2: getgroups(0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 22:21:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:26 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) syz_io_uring_setup(0x593b, &(0x7f0000000540)={0x0, 0xe4bf}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) [ 678.411591][T14023] EXT4-fs (loop1): unsupported descriptor size 0 22:21:26 executing program 3: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x0, 0x3938700}) 22:21:27 executing program 2: socketpair(0x0, 0x8000d, 0x0, &(0x7f0000000200)) 22:21:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x198, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:27 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 22:21:27 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, 0x0) [ 679.257400][T14042] EXT4-fs (loop1): unsupported descriptor size 0 22:21:28 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:28 executing program 3: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x8, 0x301580) 22:21:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000005c0)={0x2, &(0x7f0000000580)=[{}, {0x8}]}) 22:21:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x198, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:28 executing program 2: syz_genetlink_get_family_id$batadv(0x0) syz_io_uring_setup(0x7b19, &(0x7f0000000180), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000240)) [ 680.340757][T14060] EXT4-fs (loop1): unsupported descriptor size 0 22:21:28 executing program 4: ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000000)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x3b7}) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x101) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000400)={0x0, 0x0, r1, 0x9c8}) syz_io_uring_setup(0x593b, &(0x7f0000000540)={0x0, 0xe4bf, 0x8, 0x3, 0x380}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) 22:21:28 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x5, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x0, 0x3}) 22:21:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:29 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x198, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:29 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@private0, @private2, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40400080}) 22:21:29 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f00000000c0)) [ 681.181075][T14080] EXT4-fs (loop1): unsupported descriptor size 0 22:21:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:29 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f00000002c0)='/dev/video#\x00', 0x5, 0x2) ioctl$vim2m_VIDIOC_STREAMOFF(r0, 0x40045612, &(0x7f0000000300)) 22:21:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:30 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 22:21:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1c8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9c, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="183d8ca938d3ce872e4e09"]}]}, 0x1c8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:30 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, 0x0) [ 682.117780][T14103] EXT4-fs (loop1): unsupported descriptor size 0 22:21:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000340), 0x4) 22:21:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:30 executing program 2: syz_genetlink_get_family_id$wireguard(&(0x7f0000000940)='wireguard\x00') 22:21:31 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1c8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9c, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="183d8ca938d3ce872e4e09"]}]}, 0x1c8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:31 executing program 3: r0 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="f9", 0x1, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 22:21:31 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) [ 683.090183][T14119] EXT4-fs (loop1): unsupported descriptor size 0 22:21:31 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:31 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1c8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9c, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="183d8ca938d3ce872e4e09"]}]}, 0x1c8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:31 executing program 3: keyctl$reject(0x13, 0x0, 0x0, 0x5, 0x0) 22:21:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) 22:21:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:32 executing program 4: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) syz_io_uring_setup(0x593b, &(0x7f0000000540)={0x0, 0xe4bf}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) 22:21:32 executing program 3: mq_open(&(0x7f0000000000)='!}.\x00', 0x40, 0x0, 0x0) 22:21:32 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1c8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9c, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic, @generic="183d8ca938d3ce872e4e09"]}]}, 0x1c8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 684.254531][T14140] EXT4-fs (loop1): unsupported descriptor size 0 22:21:32 executing program 2: r0 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="f9", 0x1, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee01, 0x0) 22:21:32 executing program 4: r0 = inotify_init() ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 22:21:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:33 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty}}) [ 685.605743][T14161] EXT4-fs (loop1): unsupported descriptor size 0 22:21:34 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1c8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9c, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic, @generic="183d8ca938d3ce872e4e09"]}]}, 0x1c8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000180)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 22:21:34 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000280)=0xa9) 22:21:34 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f00000012c0)={0x28, 0x0, 0x0, @hyper}, 0x10) 22:21:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:34 executing program 4: ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000000)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101100, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x3b7, 0xffff0001}) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x101) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) r3 = pidfd_getfd(r0, r0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r3, 0xc2604110, &(0x7f0000000180)={0x401, [[0x4, 0x0, 0x1fc, 0x1, 0x11ab, 0x0, 0x8001, 0x1], [0x20, 0x101, 0x100, 0x2800000, 0x100, 0x8, 0x0, 0x33d1], [0x3, 0x59, 0x40, 0x6, 0x80000001, 0x5, 0x8, 0x5487]], [], [{0x2, 0xfff, 0x1, 0x1}, {0x6, 0x10000, 0x1, 0x0, 0x0, 0x1}, {0x1000, 0x0, 0x1, 0x1}, {0xfff, 0x6, 0x1, 0x1, 0x1, 0x1}, {0xe0, 0x8d, 0x0, 0x1, 0x0, 0x1}, {0x400, 0x9, 0x1, 0x0, 0x1, 0x1}, {0x4, 0xbdb8, 0x0, 0x1, 0x1}, {0x80000001, 0x6, 0x1, 0x0, 0x0, 0x1}, {0x3ff, 0x92, 0x1, 0x0, 0x1}, {0x23, 0x3, 0x1, 0x1}, {0x4, 0xcf, 0x1, 0x1, 0x1}, {0x1, 0x6f1e4f26, 0x0, 0x1, 0x0, 0x1}], [], 0xde}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000400)={0x0, 0x0, r1, 0x9c8}) syz_io_uring_setup(0x593b, &(0x7f0000000540)={0x0, 0xe4bf, 0x8, 0x3, 0x380}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x42a) 22:21:34 executing program 2: syz_io_uring_setup(0xcc4, &(0x7f0000000180)={0x0, 0x0, 0x21}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 22:21:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1c8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x9c, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic, @generic="183d8ca938d3ce872e4e09"]}]}, 0x1c8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 686.574355][T14180] EXT4-fs (loop1): unsupported descriptor size 0 22:21:35 executing program 3: r0 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="f9", 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r0, &(0x7f0000000380)=""/209, 0xd1) 22:21:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:35 executing program 2: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 22:21:35 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:35 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x248, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x11b, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b7", @generic="183d8ca938d3ce872e4e09"]}]}, 0x248}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:35 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000080)) 22:21:35 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000040)="1a") [ 687.577228][T14200] EXT4-fs (loop1): unsupported descriptor size 0 22:21:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000005c0)={0x0, 0x0}) 22:21:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:36 executing program 3: socketpair(0xa, 0x2, 0x0, &(0x7f0000000140)) 22:21:36 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x248, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x11b, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b7", @generic="183d8ca938d3ce872e4e09"]}]}, 0x248}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:36 executing program 4: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) syz_io_uring_setup(0x2e56, &(0x7f0000000240)={0x0, 0x144f, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, &(0x7f0000000300)) syz_open_dev$dri(&(0x7f00000004c0)='/dev/dri/card#\x00', 0x0, 0x400080) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000600)={0x0}) [ 688.567753][T14218] EXT4-fs (loop1): unsupported descriptor size 0 22:21:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:37 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x0, 0x0) syz_usb_ep_read(0xffffffffffffffff, 0x2, 0x59, &(0x7f0000000440)=""/89) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000002c0)={@local}, &(0x7f0000000300)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl2\x00', 0x0, 0x4, 0x9b, 0x3d, 0x6, 0x2a, @ipv4={[], [], @loopback}, @private0={0xfc, 0x0, [], 0x1}, 0x8, 0x1, 0x7, 0xffff}}) socket$l2tp6(0xa, 0x2, 0x73) 22:21:37 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x0, 0x3}) 22:21:37 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 689.759455][T14237] EXT4-fs (loop1): unsupported descriptor size 0 22:21:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=[@sndinfo={0x1c}], 0x1c}, 0x0) 22:21:38 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x248, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x11b, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b7", @generic="183d8ca938d3ce872e4e09"]}]}, 0x248}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:38 executing program 4: r0 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="f9", 0x1, 0xfffffffffffffffd) keyctl$read(0xb, r0, 0x0, 0x0) 22:21:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000005c0)={0x1, &(0x7f0000000580)=[{}]}) [ 690.704054][T14258] EXT4-fs (loop1): unsupported descriptor size 0 22:21:39 executing program 2: syz_io_uring_setup(0x2e56, &(0x7f0000000240)={0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 22:21:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:39 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x288, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x15a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a784", @generic="183d8ca938d3ce872e4e09"]}]}, 0x288}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:39 executing program 4: accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10, 0x0) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000900)='devlink\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 22:21:40 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0xc) 22:21:40 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 691.787913][T14283] EXT4-fs (loop1): unsupported descriptor size 0 22:21:40 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1d, 0x0, &(0x7f00000009c0)) 22:21:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:40 executing program 4: syz_genetlink_get_family_id$nbd(0x0) 22:21:40 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x288, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x15a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a784", @generic="183d8ca938d3ce872e4e09"]}]}, 0x288}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:40 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) acct(&(0x7f0000000140)='./file0\x00') close(r0) 22:21:41 executing program 2: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) socket$inet6(0xa, 0x0, 0x3f) syz_io_uring_setup(0x2e56, &(0x7f0000000240)={0x0, 0x144f, 0x2, 0x3, 0x22c}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) [ 692.763896][T14302] EXT4-fs (loop1): unsupported descriptor size 0 22:21:41 executing program 4: pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x3}, &(0x7f00000001c0), &(0x7f0000000240)={&(0x7f0000000200), 0x8}) 22:21:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x288, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x15a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a784", @generic="183d8ca938d3ce872e4e09"]}]}, 0x288}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:41 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000040)) 22:21:42 executing program 4: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:21:42 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:42 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={0x0, 0x0, "8352c2", 0x3}) [ 694.015692][T14335] EXT4-fs (loop1): unsupported descriptor size 0 22:21:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:42 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/keys\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/207, 0xcf) 22:21:42 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x17a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2a8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0xa00, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) [ 695.110290][T14354] EXT4-fs (loop1): unsupported descriptor size 0 22:21:43 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000000)={0x1, @write_eir={{0xc52, 0xf1}, {0x0, "8b4c2777cdf14f89dba47a51785e39a01a15517cc98fb7f57496147e5c63450e369efd91e32ce45fc0ea78707ff9e41bd337f9b0141430b032654bfa7fcc54867a2558c8b50204be4adfc0a22bc586a7282c06c1cdd9e6831071d0abed470dff1b1763da88e4d7cf1d795253095f2fff3e491ec710c73d6d6926956460c35a612e30803649b26e545cd401d30023ea7f0e8a2523664e60b97c7ca869224d38749eb8762f5886ee1cd5f163c7e49813b448522f0c7d6e9fce54501ecbb92c57df91b25ba48abb98398b5107390f0e27b637bbbc05e511d321e7bd23aff8e6ba68f0ddb66a8981d849098a1483b7712478"}}}, 0xf5) 22:21:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x17a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2a8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:44 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000002200)=0xffff, 0x4) 22:21:44 executing program 4: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) [ 696.056342][T14371] EXT4-fs (loop1): unsupported descriptor size 0 22:21:44 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:44 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x541b, 0x0) 22:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:44 executing program 2: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 22:21:44 executing program 4: add_key(&(0x7f00000004c0)='big_key\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='B', 0x1, 0xfffffffffffffffb) [ 696.455008][ T8479] Bluetooth: hci0: command 0x0401 tx timeout 22:21:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x17a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2a8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:45 executing program 3: syz_open_dev$dri(&(0x7f00000004c0)='/dev/dri/card#\x00', 0x0, 0x0) [ 697.012872][T14386] EXT4-fs (loop1): unsupported descriptor size 0 22:21:45 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045005, &(0x7f0000000040)) 22:21:45 executing program 2: socketpair(0x2, 0x0, 0x1000, &(0x7f0000000000)) 22:21:45 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, 0x0) 22:21:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x18a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d69683322", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2b8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 698.194148][T14405] EXT4-fs (loop1): unsupported descriptor size 0 22:21:46 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:46 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101100, 0x0) 22:21:46 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) 22:21:46 executing program 4: r0 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="f9", 0x1, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000200)={r0}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'sha384-avx\x00'}}, 0x0, 0x0) 22:21:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x18a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d69683322", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2b8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x40) 22:21:47 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f00000000c0)) 22:21:47 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) [ 699.199724][T14424] EXT4-fs (loop1): unsupported descriptor size 0 22:21:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x18a, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d69683322", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2b8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:48 executing program 4: syz_usb_connect$hid(0x3, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x341, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x263, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x3, 0x6, {0x9, 0x21, 0x6, 0x4, 0x1, {0x22, 0x7b}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x2, 0x2}}}}}]}}]}}, &(0x7f00000002c0)={0x0, 0x0, 0x25, &(0x7f0000000140)={0x5, 0xf, 0x25, 0x5, [@ptm_cap={0x3}, @ptm_cap={0x3}, @ptm_cap={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x80, "45edb4c6e113cfb79ff1b1c9e0656cbc"}, @ptm_cap={0x3}]}, 0x2, [{0x3b, &(0x7f00000001c0)=@string={0x3b, 0x3, "60c5e86d423666dfe89b9a7d3d5435f7e75cec7d9088dc8d49abccbe531a235c84ea28d301dddd04e10a167f32d1acbb697180e051bc56a246"}}, {0x43, &(0x7f0000000200)=@string={0x43, 0x3, "bb79700a8664363f8233c8583905ea0463a0bfaa6ef701c8431049ad2a75bb89aca35e07fd6b03fd2e9ae27d57305298659ec607fcacff4011e9f8830950657846"}}]}) 22:21:48 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:48 executing program 3: openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x101880, 0x0) [ 700.204951][T14440] EXT4-fs (loop1): unsupported descriptor size 0 22:21:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0x0, "bc4806b719dab11470c66ee94d485cbdcd1cdb"}) 22:21:48 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x192, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a045", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 700.516658][ T57] usb 5-1: new high-speed USB device number 2 using dummy_hcd 22:21:49 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 700.784283][ T57] usb 5-1: Using ep0 maxpacket: 8 22:21:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000040)=@delchain={0xec4, 0x65, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0xe98, 0x2, [@TCA_FW_ACT={0x250, 0x4, [@m_ct={0x104, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_CT_MARK_MASK={0x8}]}, {0xd1, 0x6, "c72010c5704d818b71a5582f335c6691265b1c514ba03708b593384ee94d9774befe461df18c1f4994723c7ed833fc7e6daadaf8b123e0882fbd36a2dc595863a46bcb1fc493ed5abc5424cf1f0c0f2f0f9bbb67f96557361b25ec13d6420f98fa3893ec50634d21871cbdb2adf7e03fff59a8cf4e4507b7d3b66c9a721f6bd3350825ea3e6edbdfb95948b1fa50313f7d93c0357d883aad1345e364ade062d3ed8c2ada79b170c770118c6a00c59df51fffb774733caac5edfe945db4ec76e481b3093090d092a61d51080919"}, {0xc}, {0xc}}}, @m_ct={0xdc, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_LABELS={0x14, 0x7, "f18cfb406dbc71209523f9ecc4e3cac4"}, @TCA_CT_NAT_PORT_MIN={0x6}]}, {0x7d, 0x6, "b4b53b7d55ac61bc37c7d419f8f9b1fdb5363a43fd8ba7a267511e310d70ba0c3fdf542d6f0615f6d9a48aed7349c85d696207b2ef06139fe2c42ce45b784f61e39807b25fe981ae8bdd8a5b2eb9b2e9651a7da3f3e1f191c840997bb595aea42ed7995ae9e90f65c9039a34e2e788d2974b7dd8853880deb8"}, {0xc}, {0xc}}}, @m_bpf={0x6c, 0x0, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}]}, {0xd, 0x6, "c3795fafbd128bebef"}, {0xc}, {0xc}}}]}, @TCA_FW_MASK={0x8}, @TCA_FW_ACT={0xc3c, 0x4, [@m_tunnel_key={0x100, 0x0, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @multicast1}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0xa9, 0x6, "4c5b8ecc438acfaae0f3a32e1d04a0850a381d72c645257f224d8109ffadae37b8c89a56828ac71b3d8db895a30e609c44017ad0860946ce0bef9fb84eb9887af72945b5fc37e34e7a4e7537b68e91eb3df48c9359e49942d5efd18fe657ba74ba86ed62aa1688a82befd65003d32254228f1af922e9a7163871fc439844e7d9cd14e648e812453038943ec52aad58b706e9ee1c53075da657bef324593feb84a787538a39"}, {0xc}, {0xc}}}, @m_ctinfo={0xc8, 0x16, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8}]}, {0x91, 0x6, "395c9ea04f65a4a52f15dc5e8e4c2d9c3717b6b3c8128ed078e7fc3f932815279742937f5633915bc058cfdebfb19269c53a799bdd25be8a17d54638fee03b7638282f7ad2d619e74e876c3ea060613e51be487cb73e951568246826c8df9a15db4ad2b68850488eef484af904910e44be997568ab3dded6411f481197d53774efb9a028f083579c943a7f0066"}, {0xc}, {0xc}}}, @m_csum={0xa4, 0x0, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x4}, {0x75, 0x6, "48e53ae1ac3d8f8307e198068886e7abbd3058d08f11a7fa8c135cca6d0a0e8e075c13ca361f30ed2ddb5795a2febc21f2e6bdf9f77bbed69d2eadf5f82bfc376a17ef1d15d1774bc05d737332256f6f671f8ec4997119381df2fdd7299410713be1cd432a33cb33cfa45b7d7a47c0b737"}, {0xc}, {0xc}}}, @m_police={0x9cc, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x4}, {0x99d, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}}]}, 0xec4}}, 0x0) 22:21:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x192, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a045", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 701.101259][ T57] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 701.111365][ T57] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 701.210864][T14458] EXT4-fs (loop1): unsupported descriptor size 0 [ 701.375918][ T57] usb 5-1: New USB device found, idVendor=05ac, idProduct=0263, bcdDevice= 0.40 [ 701.385340][ T57] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 701.393705][ T57] usb 5-1: Product: syz [ 701.398015][ T57] usb 5-1: Manufacturer: 离ੰ撆㼶㎂壈ԹӪê£êª¿ï®ì áƒêµ‰ç”ªè¦»êŽ¬Ýžæ¯½ï´ƒé¨®ç·¢ã—顒鹥߆과䃿è¸å€‰ç¡¥ [ 701.411206][ T57] usb 5-1: SerialNumber: syz 22:21:50 executing program 3: openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/raw/rawctl\x00', 0x0, 0x0) 22:21:50 executing program 2: r0 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="f9", 0x1, 0xfffffffffffffffd) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, 0x0, 0x0, r0) 22:21:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 702.046980][ T57] usbhid 5-1:1.0: can't add hid device: -71 [ 702.053937][ T57] usbhid: probe of 5-1:1.0 failed with error -71 [ 702.081682][ T57] usb 5-1: USB disconnect, device number 2 [ 702.425086][T14483] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 702.724116][ T57] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 703.015406][ T57] usb 5-1: Using ep0 maxpacket: 8 [ 703.254599][ T57] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 703.264889][ T57] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 22:21:51 executing program 4: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 22:21:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x192, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a045", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:51 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) 22:21:51 executing program 2: r0 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="f9", 0x1, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)=@builtin='builtin_trusted\x00') 22:21:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 703.537755][ T57] usb 5-1: New USB device found, idVendor=05ac, idProduct=0263, bcdDevice= 0.40 [ 703.547213][ T57] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 703.707026][ T57] usb 5-1: can't set config #1, error -71 22:21:52 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000600), 0x8) [ 703.793098][ T57] usb 5-1: USB disconnect, device number 3 [ 703.823024][T14504] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:21:52 executing program 2: syz_usb_connect$hid(0x3, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x341, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x263, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x3, 0x6, {0x9, 0x21, 0x6, 0x4, 0x1, {0x22, 0x7b}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x2, 0x2}}}}}]}}]}}, &(0x7f00000002c0)={0x0, 0x0, 0x25, &(0x7f0000000140)={0x5, 0xf, 0x25, 0x5, [@ptm_cap={0x3}, @ptm_cap={0x3}, @ptm_cap={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x80, "45edb4c6e113cfb79ff1b1c9e0656cbc"}, @ptm_cap={0x3}]}, 0x2, [{0x3a, &(0x7f00000001c0)=@string={0x3a, 0x3, "60c5e86d423666dfe89b9a7d3d5435f7e75cec7d9088dc8d49abccbe531a235c84ea28d301dddd04e10a167f32d1acbb697180e051bc56a2"}}, {0x43, &(0x7f0000000200)=@string={0x43, 0x3, "bb79700a8664363f8233c8583905ea0463a0bfaa6ef701c8431049ad2a75bb89aca35e07fd6b03fd2e9ae27d57305298659ec607fcacff4011e9f8830950657846"}}]}) [ 704.156911][T14515] fuse: Bad value for 'fd' 22:21:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x196, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000040)=@delchain={0x1eb0, 0x65, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x1e84, 0x2, [@TCA_FW_ACT={0x250, 0x4, [@m_ct={0x104, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_CT_MARK_MASK={0x8}]}, {0xd1, 0x6, "c72010c5704d818b71a5582f335c6691265b1c514ba03708b593384ee94d9774befe461df18c1f4994723c7ed833fc7e6daadaf8b123e0882fbd36a2dc595863a46bcb1fc493ed5abc5424cf1f0c0f2f0f9bbb67f96557361b25ec13d6420f98fa3893ec50634d21871cbdb2adf7e03fff59a8cf4e4507b7d3b66c9a721f6bd3350825ea3e6edbdfb95948b1fa50313f7d93c0357d883aad1345e364ade062d3ed8c2ada79b170c770118c6a00c59df51fffb774733caac5edfe945db4ec76e481b3093090d092a61d51080919"}, {0xc}, {0xc}}}, @m_ct={0xdc, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_LABELS={0x14, 0x7, "f18cfb406dbc71209523f9ecc4e3cac4"}, @TCA_CT_NAT_PORT_MIN={0x6}]}, {0x7d, 0x6, "b4b53b7d55ac61bc37c7d419f8f9b1fdb5363a43fd8ba7a267511e310d70ba0c3fdf542d6f0615f6d9a48aed7349c85d696207b2ef06139fe2c42ce45b784f61e39807b25fe981ae8bdd8a5b2eb9b2e9651a7da3f3e1f191c840997bb595aea42ed7995ae9e90f65c9039a34e2e788d2974b7dd8853880deb8"}, {0xc}, {0xc}}}, @m_bpf={0x6c, 0x0, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}]}, {0xd, 0x6, "c3795fafbd128bebef"}, {0xc}, {0xc}}}]}, @TCA_FW_MASK={0x8}, @TCA_FW_ACT={0x1c28, 0x4, [@m_tunnel_key={0x100, 0x0, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @multicast1}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0xa9, 0x6, "4c5b8ecc438acfaae0f3a32e1d04a0850a381d72c645257f224d8109ffadae37b8c89a56828ac71b3d8db895a30e609c44017ad0860946ce0bef9fb84eb9887af72945b5fc37e34e7a4e7537b68e91eb3df48c9359e49942d5efd18fe657ba74ba86ed62aa1688a82befd65003d32254228f1af922e9a7163871fc439844e7d9cd14e648e812453038943ec52aad58b706e9ee1c53075da657bef324593feb84a787538a39"}, {0xc}, {0xc}}}, @m_ctinfo={0xc8, 0x0, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8}]}, {0x91, 0x6, "395c9ea04f65a4a52f15dc5e8e4c2d9c3717b6b3c8128ed078e7fc3f932815279742937f5633915bc058cfdebfb19269c53a799bdd25be8a17d54638fee03b7638282f7ad2d619e74e876c3ea060613e51be487cb73e951568246826c8df9a15db4ad2b68850488eef484af904910e44be997568ab3dded6411f481197d53774efb9a028f083579c943a7f0066"}, {0xc}, {0xc}}}, @m_csum={0xa4, 0x0, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x4}, {0x75, 0x6, "48e53ae1ac3d8f8307e198068886e7abbd3058d08f11a7fa8c135cca6d0a0e8e075c13ca361f30ed2ddb5795a2febc21f2e6bdf9f77bbed69d2eadf5f82bfc376a17ef1d15d1774bc05d737332256f6f671f8ec4997119381df2fdd7299410713be1cd432a33cb33cfa45b7d7a47c0b737"}, {0xc}, {0xc}}}, @m_police={0x19b8, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0xc10, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404}], [@TCA_POLICE_PEAKRATE={0x404}], [@TCA_POLICE_PEAKRATE={0x404}]]}, {0xd7d, 0x6, "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"}, {0xc}, {0xc}}}]}]}}]}, 0x1eb0}}, 0x0) 22:21:53 executing program 3: rt_sigsuspend(&(0x7f0000000000)={[0x89]}, 0x8) 22:21:53 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 704.784408][T14524] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:21:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 704.983512][ T57] usb 3-1: new high-speed USB device number 8 using dummy_hcd 22:21:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x196, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:53 executing program 4: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x220000) [ 705.253788][ T57] usb 3-1: Using ep0 maxpacket: 8 [ 705.465551][T14539] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 705.494357][ T57] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 705.504391][ T57] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 705.687740][ T57] usb 3-1: New USB device found, idVendor=05ac, idProduct=0263, bcdDevice= 0.40 [ 705.697345][ T57] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 705.705874][ T57] usb 3-1: Product: syz [ 705.710178][ T57] usb 3-1: Manufacturer: 离ੰ撆㼶㎂壈ԹӪê£êª¿ï®ì áƒêµ‰ç”ªè¦»êŽ¬Ýžæ¯½ï´ƒé¨®ç·¢ã—顒鹥߆과䃿è¸å€‰ç¡¥ [ 705.722776][ T57] usb 3-1: SerialNumber: syz 22:21:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:54 executing program 4: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x263, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f00000002c0)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x0, 0xfe}, 0x0, 0x0, 0x2, [{0x2, &(0x7f00000001c0)=@string={0x2}}, {0x0, 0x0}]}) 22:21:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x196, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 706.344001][ T57] usbhid 3-1:1.0: can't add hid device: -71 [ 706.350540][ T57] usbhid: probe of 3-1:1.0 failed with error -71 [ 706.398255][ T57] usb 3-1: USB disconnect, device number 8 [ 706.516915][T14558] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 706.793767][ T8827] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 707.033572][ T8827] usb 5-1: Using ep0 maxpacket: 8 [ 707.061438][ T57] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 707.153622][ T8827] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 707.205324][ T8827] usb 5-1: language id specifier not provided by device, defaulting to English [ 707.334859][ T57] usb 3-1: Using ep0 maxpacket: 8 [ 707.545060][ T8827] usb 5-1: New USB device found, idVendor=05ac, idProduct=0263, bcdDevice= 0.40 [ 707.545960][ T57] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 707.554515][ T8827] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 707.564506][ T57] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 707.588849][ T8827] usb 5-1: Product: syz [ 707.593362][ T8827] usb 5-1: SerialNumber: syz 22:21:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x8906, 0x0) 22:21:56 executing program 3: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x101}, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)={&(0x7f0000000200), 0x8}) 22:21:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x198, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:56 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 707.775803][ T8827] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 707.904779][ T57] usb 3-1: New USB device found, idVendor=05ac, idProduct=0263, bcdDevice= 0.40 [ 707.914198][ T57] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 708.008256][ T8478] usb 5-1: USB disconnect, device number 4 [ 708.086004][ T57] usb 3-1: can't set config #1, error -71 [ 708.144806][T14584] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 708.144916][ T57] usb 3-1: USB disconnect, device number 9 22:21:56 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0x5452, &(0x7f0000000140)=0xfffffffd) 22:21:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x198, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x21041) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) [ 708.815092][ T8827] usb 5-1: new high-speed USB device number 5 using dummy_hcd 22:21:57 executing program 3: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000040)) syz_io_uring_setup(0x2e56, &(0x7f0000000240)={0x0, 0x144f, 0x2, 0x3, 0x22c}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dri(0x0, 0x9, 0x0) ioctl$sock_ifreq(r0, 0x2c, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000580)) [ 709.061371][T14608] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 709.077411][ T8827] usb 5-1: Using ep0 maxpacket: 8 [ 709.211680][ T8827] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 709.268880][ T8827] usb 5-1: language id specifier not provided by device, defaulting to English 22:21:58 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0) 22:21:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 22:21:58 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:21:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x198, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 709.633687][ T8827] usb 5-1: New USB device found, idVendor=05ac, idProduct=0263, bcdDevice= 0.40 [ 709.642901][ T8827] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 709.651590][ T8827] usb 5-1: Product: syz [ 709.783900][ T8827] usb 5-1: can't set config #1, error -71 [ 709.892577][ T8827] usb 5-1: USB disconnect, device number 5 22:21:58 executing program 3: waitid(0x2, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000400)) 22:21:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x191, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 710.270751][T14641] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:21:58 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0x3, 0x0, 0x8b5eaa9}) 22:21:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:21:59 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x8982, 0x0) 22:21:59 executing program 3: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0), 0x0) 22:21:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x191, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:21:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x10000, 0x0) 22:21:59 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 711.259154][T14657] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:21:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003e00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000003dc0)={&(0x7f0000000040)=@delchain={0x1ec4, 0x65, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x1e98, 0x2, [@TCA_FW_ACT={0x250, 0x4, [@m_ct={0x104, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_CT_MARK_MASK={0x8}]}, {0xd1, 0x6, "c72010c5704d818b71a5582f335c6691265b1c514ba03708b593384ee94d9774befe461df18c1f4994723c7ed833fc7e6daadaf8b123e0882fbd36a2dc595863a46bcb1fc493ed5abc5424cf1f0c0f2f0f9bbb67f96557361b25ec13d6420f98fa3893ec50634d21871cbdb2adf7e03fff59a8cf4e4507b7d3b66c9a721f6bd3350825ea3e6edbdfb95948b1fa50313f7d93c0357d883aad1345e364ade062d3ed8c2ada79b170c770118c6a00c59df51fffb774733caac5edfe945db4ec76e481b3093090d092a61d51080919"}, {0xc}, {0xc}}}, @m_ct={0xdc, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_LABELS={0x14, 0x7, "f18cfb406dbc71209523f9ecc4e3cac4"}, @TCA_CT_NAT_PORT_MIN={0x6}]}, {0x7d, 0x6, "b4b53b7d55ac61bc37c7d419f8f9b1fdb5363a43fd8ba7a267511e310d70ba0c3fdf542d6f0615f6d9a48aed7349c85d696207b2ef06139fe2c42ce45b784f61e39807b25fe981ae8bdd8a5b2eb9b2e9651a7da3f3e1f191c840997bb595aea42ed7995ae9e90f65c9039a34e2e788d2974b7dd8853880deb8"}, {0xc}, {0xc}}}, @m_bpf={0x6c, 0x0, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}]}, {0xd, 0x6, "c3795fafbd128bebef"}, {0xc}, {0xc}}}]}, @TCA_FW_MASK={0x8}, @TCA_FW_ACT={0x1c3c, 0x4, [@m_tunnel_key={0x100, 0x0, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @multicast1}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0xa9, 0x6, "4c5b8ecc438acfaae0f3a32e1d04a0850a381d72c645257f224d8109ffadae37b8c89a56828ac71b3d8db895a30e609c44017ad0860946ce0bef9fb84eb9887af72945b5fc37e34e7a4e7537b68e91eb3df48c9359e49942d5efd18fe657ba74ba86ed62aa1688a82befd65003d32254228f1af922e9a7163871fc439844e7d9cd14e648e812453038943ec52aad58b706e9ee1c53075da657bef324593feb84a787538a39"}, {0xc}, {0xc}}}, @m_ctinfo={0xc8, 0x0, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8}]}, {0x91, 0x6, "395c9ea04f65a4a52f15dc5e8e4c2d9c3717b6b3c8128ed078e7fc3f932815279742937f5633915bc058cfdebfb19269c53a799bdd25be8a17d54638fee03b7638282f7ad2d619e74e876c3ea060613e51be487cb73e951568246826c8df9a15db4ad2b68850488eef484af904910e44be997568ab3dded6411f481197d53774efb9a028f083579c943a7f0066"}, {0xc}, {0xc}}}, @m_csum={0xa4, 0x0, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x4}, {0x75, 0x6, "48e53ae1ac3d8f8307e198068886e7abbd3058d08f11a7fa8c135cca6d0a0e8e075c13ca361f30ed2ddb5795a2febc21f2e6bdf9f77bbed69d2eadf5f82bfc376a17ef1d15d1774bc05d737332256f6f671f8ec4997119381df2fdd7299410713be1cd432a33cb33cfa45b7d7a47c0b737"}, {0xc}, {0xc}}}, @m_police={0x19cc, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0xc10, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404}], [@TCA_POLICE_PEAKRATE={0x404}], [@TCA_POLICE_PEAKRATE={0x404}]]}, {0xd91, 0x6, "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"}, {0xc}, {0xc}}}]}]}}]}, 0x1ec4}}, 0x0) 22:22:00 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) 22:22:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x191, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:00 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/sem\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x13, r0, 0x10000000) [ 712.107593][T14675] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:22:00 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f00000001c0)) 22:22:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:01 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0), 0x4) 22:22:01 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000680)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000006c0)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 22:22:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x240, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x114, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x240}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:01 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 713.172481][T14691] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:22:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x0, 0x0, 0x0, 0xc}, 0x20) 22:22:01 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f00000000c0)={'vlan0\x00', 0x0}) 22:22:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:02 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc040564a, &(0x7f0000000000)={0x0, 0xff}) 22:22:02 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x240, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x114, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x240}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 713.932177][T14706] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 714.146634][T14710] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:22:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x38, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) 22:22:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x7, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) 22:22:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000080)="c2", 0x1}], 0x2}}], 0x1, 0x0) 22:22:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x240, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x114, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x240}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:03 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 715.252821][T14725] EXT4-fs (loop1): invalid first ino: 0 22:22:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, 0x0, 0x0) 22:22:03 executing program 4: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000002800)) 22:22:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x240, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x114, 0x0, 0x0, 0x1, [@generic, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x240}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8}, 0x10) 22:22:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:22:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x42) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @multicast2}, 0x0, 0x3}, 0x20) [ 716.240400][T14744] EXT4-fs (loop1): invalid first ino: 0 22:22:04 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000000)={0x2}) 22:22:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:05 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x240, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x114, 0x0, 0x0, 0x1, [@generic, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x240}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r1, 0x0, 0x1, 0x4}}, 0x20) [ 717.292544][T14762] EXT4-fs (loop1): invalid first ino: 0 22:22:05 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 22:22:05 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) read$midi(r0, 0x0, 0x0) 22:22:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x240, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x114, 0x0, 0x0, 0x1, [@generic, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x240}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:06 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x5, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc040564a, &(0x7f0000000000)) 22:22:06 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x5, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0585605, &(0x7f0000000000)) 22:22:06 executing program 2: syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0xe4381) [ 718.331322][T14784] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:06 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x15, 0x0, 0x0) 22:22:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x284, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x157, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x284}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x49, 0x0, 0x0) 22:22:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) [ 719.269572][T14801] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:07 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:07 executing program 2: syz_open_dev$audion(&(0x7f0000000dc0)='/dev/audio#\x00', 0x1, 0x46000) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 22:22:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5624c682}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:22:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x284, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x157, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x284}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private2}, 0x20) 22:22:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000180), 0x8) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f00000000c0)=ANY=[], 0x28) 22:22:08 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x284, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x157, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x284}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:08 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1e, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) [ 720.144760][T14820] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="7400000066000b0225bd7000fedbdf2500000000", @ANYBLOB="07000e001000e0ff0d000e0008000b00fc"], 0x74}}, 0x0) 22:22:09 executing program 3: sched_getattr(0x0, &(0x7f0000000cc0)={0x38}, 0x38, 0x0) [ 721.196195][T14836] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) [ 721.230465][T14838] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.4'. 22:22:09 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:10 executing program 2: socket$can_j1939(0x1d, 0x2, 0x7) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, 0x0, 0x0) 22:22:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2a4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x178, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2a4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:10 executing program 4: socket$inet6(0xa, 0x5, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) 22:22:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) [ 722.363781][T14854] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 22:22:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 22:22:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2a4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x178, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2a4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:11 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001980)=[{0x0}, {&(0x7f0000000640)="86", 0x1}, {&(0x7f0000001640)="9b", 0x1}], 0x3, &(0x7f0000001f40)=ANY=[], 0x2c0}, 0x0) 22:22:11 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x1}, 0x14}}, 0x0) [ 723.368787][T14873] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2a4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x178, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2a4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000d80)) 22:22:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:12 executing program 3: rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000040)={0x0, 0x0, 0x9}) 22:22:12 executing program 4: mmap$perf(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 22:22:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x0, @sco, @isdn, @xdp={0x2c, 0x0, 0x0, 0x23}}) 22:22:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x189, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2b8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 724.683894][T14894] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x46085, 0x0, 0x0) 22:22:13 executing program 4: socket$inet6(0xa, 0x2, 0x6) 22:22:13 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:13 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00'}) 22:22:13 executing program 3: select(0x40, &(0x7f0000000000)={0x3}, &(0x7f0000000040), 0x0, 0x0) 22:22:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x189, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2b8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 725.776801][T14912] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:14 executing program 4: chown(&(0x7f0000000100)='.\x00', 0xee00, 0x0) 22:22:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001500)={0x3, 0x0, 0x4, 0x3}, 0x40) 22:22:14 executing program 2: socketpair(0xb, 0x0, 0x0, &(0x7f0000000340)) 22:22:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x189, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2b8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 726.894119][T14932] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:15 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="110202"], 0x18) 22:22:15 executing program 2: syz_io_uring_setup(0x8a, &(0x7f0000000140), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 22:22:15 executing program 4: getitimer(0x2, &(0x7f0000001f80)) 22:22:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x191, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'dummy0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='7']}) [ 727.971405][T14959] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:16 executing program 2: syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1ff, 0x0) 22:22:16 executing program 4: clone3(&(0x7f00000006c0)={0x81000880, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:22:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:17 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x191, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:17 executing program 3: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x30, 0xffffffffffffffff, 0x0) [ 729.125399][T14976] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:17 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x18, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) 22:22:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000180), 0x8) 22:22:17 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000dc0)='/dev/audio#\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 22:22:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:18 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x191, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:18 executing program 2: pkey_alloc(0x0, 0x33a88234ee3087f2) 22:22:18 executing program 4: syz_io_uring_setup(0xb0, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) 22:22:18 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) [ 730.258281][T14994] EXT4-fs (loop1): fragment/cluster size (65536) != block size (4096) 22:22:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x13, 0x0, 0x0) 22:22:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:19 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000200)='fscrypt-provisioning\x00', 0x0, 0x0, 0x10, 0xfffffffffffffff9) [ 731.059750][T15016] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:22:19 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:19 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x195, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x36, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) 22:22:19 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:19 executing program 4: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x801) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) [ 731.719613][T15030] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 731.743753][ T8827] Bluetooth: hci5: command 0x0406 tx timeout 22:22:20 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:20 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8914, &(0x7f00000000c0)={'vlan0\x00', 0x0}) 22:22:20 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x195, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x0, 0x1, 0x0, 0xc}, 0x20) 22:22:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:21 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) [ 732.821613][T15052] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:22:22 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:22 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000dc0)='/dev/audio#\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000002f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 22:22:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x195, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x3, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) 22:22:22 executing program 3: ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:22 executing program 3: ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:22 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)) 22:22:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)={'ip6gretap0\x00'}) 22:22:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x197, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:22 executing program 3: ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:23 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:23 executing program 3: r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:23 executing program 2: syz_io_uring_setup(0x1000980, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 22:22:23 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x6, 0x31, 0xffffffffffffffff, 0x0) 22:22:23 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x197, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:24 executing program 4: openat$mice(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/input/mice\x00', 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, &(0x7f0000000200)={0x4}, 0x0, 0x0) 22:22:24 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x197, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:24 executing program 2: socket(0x11, 0x3, 0x1f) 22:22:24 executing program 3: r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(0x0, &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x35, 0x0, 0x0) [ 736.810023][T15119] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:25 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:25 executing program 2: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xffffffffffffffff, 0x200400) 22:22:25 executing program 3: r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:25 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x198, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(0x0, &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:25 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000016c0)) 22:22:26 executing program 3: syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x198, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:26 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000000440)={&(0x7f0000000100), 0xfffffffffffffdb0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/111, 0x6f}, {&(0x7f0000000200)=""/61, 0x37}, {&(0x7f0000000e00)=""/4083, 0x1000}, {&(0x7f0000000800)=""/208, 0xc4}], 0x4, &(0x7f0000000240)=ANY=[@ANYRES64, @ANYRESDEC, @ANYBLOB="87bf62abc83ed07b690d6a64746c4d242cc920d4c552906a3c5057198a80c418e154b361702f24c7e5b1cee77b439d7481ffc3c27cbd8c642396dd"], 0x100}, 0x38, 0x0) [ 737.826671][T15140] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:26 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00', @remote}) 22:22:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(0x0, &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:26 executing program 3: syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) [ 738.847073][T15157] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:27 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 22:22:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x198, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:27 executing program 3: syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000000)={0xf0f000, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:27 executing program 4: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1f, 0x86641) 22:22:28 executing program 2: select(0x7, 0x0, &(0x7f0000000040), 0x0, 0x0) 22:22:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:28 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, 0x0) 22:22:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "498e72fd4d185220077271c16811f30cdb6a71"}) [ 740.424560][T15179] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:29 executing program 2: syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, &(0x7f0000000280), 0x0) 22:22:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x3) 22:22:30 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, 0x0) 22:22:30 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000dc0)='/dev/audio#\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000002, 0x10, r0, 0x10000000) [ 741.591273][T15198] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:30 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, 0x0) 22:22:30 executing program 4: syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1f, 0x4000) 22:22:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 743.003864][T15223] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:31 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x0, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:31 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x2) 22:22:31 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x284, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x284}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 744.256854][T15243] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0xc0) 22:22:33 executing program 4: syz_io_uring_setup(0xb0, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) 22:22:33 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x0, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:33 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x284, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x284}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x2) 22:22:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 745.431640][T15264] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:33 executing program 4: syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, 0x0, 0x0) 22:22:34 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x0, 0x0, @name="4bd2196b69b7335c6f33e353df2b95ea8f35344ecadcddb1803f7d32766d04ac"}) 22:22:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x284, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x284}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r1, 0x0, 0x1, 0x400000}}, 0x20) 22:22:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x2) 22:22:35 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 747.215727][T15284] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:35 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000dc0)='/dev/audio#\x00', 0x0, 0x0) ioctl$sock_qrtr_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 22:22:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1d, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) 22:22:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}]}, 0x14, 0x2) 22:22:36 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x3d, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821"]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:36 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x100000001, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000280)) 22:22:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 22:22:36 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 748.616977][T15306] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:37 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x3d, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821"]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:37 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x82) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x30) 22:22:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}]}, 0x14, 0x2) 22:22:37 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001cc0)={&(0x7f0000000500)=@generic={0x0, "d4d40833ec1656664a29a3349cfebca93f7820610e1c687b96c0ac99da8df2912757c8dfdf0295ad56d772d32469ea0293576ffb1dee9b6c85c51ae1fa1e2c1ab3d4c7d5d8563e66dde5a572da34c680241bb44405c3e5b9d7da51a6bc34949cc6104b7603db565cf3be36759abad9b8478b336fd2c7f584ccd2497a226a"}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000580)="b8", 0x1}, {&(0x7f0000000640)="86", 0x1}, {&(0x7f0000001640)="9b", 0x1}], 0x3, &(0x7f0000001f40)=ANY=[], 0x2c0}, 0x0) 22:22:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000000100)) 22:22:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x10, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) 22:22:38 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x3d, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821"]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:38 executing program 4: openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40241}, 0x18) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:22:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {&(0x7f0000000680)="86", 0x1}], 0x3}, 0x0) [ 750.052026][T15328] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000180), 0x8) 22:22:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}]}, 0x14, 0x2) 22:22:39 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 22:22:39 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x28c, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x28c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:39 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x5, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) 22:22:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x48, &(0x7f00000005c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) [ 751.486189][T15353] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:40 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty}, 0x20) 22:22:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5624c682}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:22:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:40 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) 22:22:40 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x28c, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x28c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:40 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x28) 22:22:40 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x20008090) [ 752.593532][T15374] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 752.616617][T15374] Quota error (device loop1): dq_insert_tree: Quota tree root isn't allocated! [ 752.629469][T15374] Quota error (device loop1): qtree_write_dquot: Error -5 occurred while creating quota 22:22:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:41 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/61, 0x3d}, 0x40000042) 22:22:41 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'ipvlan0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="1d"]}) 22:22:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{}, {0x0, 0x8}]}, 0x14, 0x2) 22:22:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x28c, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x28c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:41 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x5, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000000)) 22:22:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) 22:22:42 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$inet(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) [ 753.848769][T15394] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 753.883589][T15399] Quota error (device loop1): dq_insert_tree: Quota tree root isn't allocated! [ 753.892866][T15399] Quota error (device loop1): qtree_write_dquot: Error -5 occurred while creating quota 22:22:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{}, {0x0, 0x8}]}, 0x14, 0x0) 22:22:42 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x28c, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x8, 0x0, 0x0, 0x1, [@generic, @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x28c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:42 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bond0\x00', &(0x7f00000001c0)=@ethtool_link_settings={0x4d}}) 22:22:42 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, [0x7]}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000100)) 22:22:43 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) 22:22:43 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @private}}, 0x1c) [ 755.044665][T15416] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x28c, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x8, 0x0, 0x0, 0x1, [@generic, @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x28c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:43 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) 22:22:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{}, {0x0, 0x8}]}, 0x14, 0x0) 22:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0), r1, 0x0, 0x2, 0x4}}, 0x20) 22:22:44 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x68) [ 756.137924][T15441] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:44 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000040)={'macvlan0\x00', 0x0}) 22:22:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x28c, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x8, 0x0, 0x0, 0x1, [@generic, @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x28c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:45 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8910, &(0x7f00000000c0)={'vlan0\x00', 0x0}) 22:22:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{}, {0x0, 0x8}]}, 0x14, 0x0) [ 757.393640][T15457] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:22:46 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'dummy0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="37000000fd01000003"]}) 22:22:46 executing program 4: openat$mice(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/input/mice\x00', 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x8}, 0x0, 0x0, 0x0) 22:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000680)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3, @loopback}, {0xa, 0x0, 0x0, @remote}, r1, 0x3f}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, 0x0, 0x0) 22:22:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2ac, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x25, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2ac}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:46 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001cc0)={&(0x7f0000000500)=@generic={0x0, "d4d40833ec1656664a29a3349cfebca93f7820610e1c687b96c0ac99da8df2912757c8dfdf0295ad56d772d32469ea0293576ffb1dee9b6c85c51ae1fa1e2c1ab3d4c7d5d8563e66dde5a572da34c680241bb44405c3e5b9d7da51a6bc34949cc6104b7603db565cf3be36759abad9b8478b336fd2c7f584ccd2497a226a"}, 0x80, 0x0, 0x0, 0x0, 0x2c0}, 0x0) 22:22:46 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000200)='fscrypt-provisioning\x00', 0x0, 0x0, 0x10000000, 0xfffffffffffffff9) 22:22:46 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) connect(r0, &(0x7f0000000140)=@sco={0x1f, @fixed}, 0x80) 22:22:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001700)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000001740)={0xf, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x40) 22:22:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2ac, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x25, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2ac}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0xffffffcf) 22:22:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x4, 0x0, 0x0) 22:22:47 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800043, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:22:47 executing program 3: syz_open_dev$sndmidi(&(0x7f0000000280)='/dev/snd/midiC#D#\x00', 0x200, 0x0) 22:22:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2ac, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x25, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2ac}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:47 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x50182002}, 0xc, &(0x7f0000000240)={0x0}}, 0x0) 22:22:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 22:22:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @nl, @vsock={0x28, 0x0, 0x0, @my=0x0}, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}}) 22:22:48 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:22:48 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x33, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2b8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:48 executing program 1: semget$private(0x0, 0x0, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000300)={{0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}}) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) 22:22:48 executing program 2: pipe2(&(0x7f0000000440), 0x0) 22:22:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000800)=""/173, 0xad}], 0x1) setpriority(0x0, 0x0, 0x8) 22:22:49 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:49 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff}) poll(&(0x7f0000004280)=[{}, {r0}], 0x2, 0x7) 22:22:49 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) 22:22:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x33, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2b8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) readv(r0, &(0x7f00000008c0), 0x0) 22:22:50 executing program 1: syz_io_uring_setup(0x7599, &(0x7f0000000040)={0x0, 0xe826, 0x2a}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000140)) 22:22:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x458, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x40) 22:22:50 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/autofs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 22:22:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x33, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2b8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:51 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) syz_io_uring_setup(0x7599, &(0x7f0000000040)={0x0, 0xe826, 0x2a, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000140)) 22:22:51 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0xace}], 0x0, &(0x7f0000000100)={[{@resize='resize'}]}) 22:22:51 executing program 4: write$hidraw(0xffffffffffffffff, 0x0, 0x0) 22:22:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x0, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x2, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000020000000fb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x3a, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e0", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x0, 0x0, [], 0x0, 0x0}) [ 763.654585][T15552] resize option for remount only [ 763.726132][T15552] resize option for remount only 22:22:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x20c41, 0x0) io_submit(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000800, 0x10000020000000fb], 0x100000, 0x402}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:52 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x8955, 0x0) 22:22:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13}, 0x40) 22:22:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x3a, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e0", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:52 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x4840) 22:22:53 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x0, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:53 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil}) 22:22:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$v7(&(0x7f00000000c0)='v7\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0)=[{0x0, 0x0, 0x3ff}, {&(0x7f0000002040)="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", 0x202, 0x6}], 0x0, &(0x7f0000000580)) 22:22:53 executing program 4: syz_open_dev$usbfs(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) 22:22:53 executing program 1: pkey_mprotect(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x33e7, &(0x7f0000000080), &(0x7f0000fee000/0x2000)=nil, &(0x7f0000fee000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 22:22:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x3a, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e0", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 765.534708][T15590] VFS: could not find a valid V7 on loop3. 22:22:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c2000808830d3a6d6271814d04bad32a326400d09ef28b08762de6a29bac1d068ef5577"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)={0x120, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}]}, 0x120}}, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f0020000", @ANYRES16=r5, @ANYBLOB="01044c5d4aa5080896833b00002008000300", @ANYRES32=r4, @ANYBLOB="d202330080010000080211000000080211"], 0x2f0}}, 0x0) 22:22:54 executing program 4: r0 = socket(0x2, 0x1, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x40c0) 22:22:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:22:54 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x242000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 22:22:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x3e, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0x40) 22:22:55 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x0, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000007c0)=""/174) 22:22:55 executing program 1: sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000ac0)=ANY=[], 0x3c}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f0020000", @ANYRES16=r3, @ANYBLOB="010400000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="d202330080010000080211000000080211"], 0x2f0}}, 0x0) 22:22:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:22:55 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x3e, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)={[{@nls={'nls', 0x3d, 'iso8859-13'}}, {@nls={'nls', 0x3d, 'cp862'}}]}) 22:22:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:22:56 executing program 2: io_uring_setup(0x5cf8, &(0x7f0000000000)) syz_io_uring_setup(0x5a13, &(0x7f0000000080), &(0x7f0000ffb000/0x5000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) 22:22:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x1049}, 0x40) [ 767.796776][T15634] hfsplus: unable to change nls mapping [ 767.802559][T15634] hfsplus: unable to parse mount options 22:22:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$v7(&(0x7f00000000c0)='v7\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0)=[{0x0, 0x0, 0x3ff}, {&(0x7f0000002040)="a768ee6828c7ef99427ebff668e12391a833f5825279acca1f901884349b8f3f6d404642dbd1caf28545715586e23c63f7dec765a73a95afefe8f67bec629fce4a7df598700c705beb857ff6ff03e64ad6817b73109157345a0a0d26a06be766962da2ab127192050afe211bf0ef073bf5a74192ea6232de794b1811a914d084cb801092fed4549d6215e29556c90938a5892e398fbe02dbd7b7efc05b118fde7e9c759ebfc566c47be66670a8c0ceee8ee4655034b7be4cccb5e6b5f578b8f6dc5a6e366ca7776b736c71827f2d2b0366e776329a6e7d2946134b3f4eb0e20964b9d569377570147ecdfb4e58d284ca0f5bc2ebdb1ad6cffc2801fa53bbba9623fde657f716a7a4b364c53b7674427b6d57d797508bfc9850ceff5ab203669a29faad07114cb041e8b3dfac62de369af6882a268943f75d3307bddf8f2960d0769465db223dc0cdeab3048eaa2a5a509347364013e13a091ff400162195780146d6638be02721d007da4c06d16eb06fe04f45c1df9abcf318c7ed31f36ee804b0caf0162bd3805b237105f694b04c386b03c9dd0370351a0416068a36366f08209d203f3a3c0650dc7ebc1bd08cb6f38915369cb9f01b2b2d9b8c31733fc88a30ac712a7d2de8fb554b62200e6a5039ab62c0761e6498391888ccaaf83d3510c8e92694a22a5a07c62f4dc2d882d2833f54cfe1a1c743eeac6639eb370f", 0x1fe, 0x6}], 0x0, &(0x7f0000000580)) 22:22:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x3e, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:56 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x6) [ 768.646390][T15656] VFS: could not find a valid V7 on loop4. 22:22:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0xc, 0x6d, 0x8000000000000002, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000006c0), &(0x7f00000008c0), 0xfff, r0}, 0x38) 22:22:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:22:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=@can_newroute={0x84, 0x18, 0x0, 0x0, 0x0, {}, [@CGW_MOD_UID={0x8, 0xe, 0xee00}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "43cf8bd50c7ec063"}}}, @CGW_MOD_UID={0x8}, @CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "07b4a23d8f79d7d2"}}}, @CGW_DST_IF={0x8}, @CGW_MOD_UID={0x8, 0xe, 0xee00}, @CGW_LIM_HOPS={0x5}, @CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "d22bd94b40b6da2e"}}}]}, 0x84}}, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f0020000", @ANYRES16=r3, @ANYBLOB="010400000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="d202330080010000080211000000080211"], 0x2f0}}, 0x0) 22:22:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x2, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000020000000fb], 0x100000, 0x402}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x40, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed8", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, 0x0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:22:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@nointegrity='nointegrity'}]}) 22:22:58 executing program 2: syz_io_uring_setup(0x60e5, &(0x7f0000000040)={0x0, 0x0, 0x20}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 22:22:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x40, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed8", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, 0x0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:22:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f0020000", @ANYRES16=r3, @ANYBLOB="010400000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="d202330080010000080211000000080211"], 0x2f0}}, 0x0) 22:22:58 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:22:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000380)=ANY=[@ANYBLOB="010000000000fb0000008900010008000300c722"], 0x38}}, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f0020000", @ANYRES16=r3, @ANYBLOB="010400000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="d202330080010000080211000000080211"], 0x2f0}}, 0x0) 22:22:59 executing program 2: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x2) 22:22:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, 0x0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:22:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c2000808830d3a6d6271814d04bad32a326400d09ef28b08762de6a29bac1d068ef55773e37d9a419729ac12ecd2505b593214fe89e845ff643b46a873c0a88b5065556b478791f190b6058659a0ee4b2f89f12ce7f8e3df8d28ca4e55ebce5cad461784de170724c412196dc45e892d1c04988019b8d69f33156e2de93a8b215cc2f7ebb"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)={0x88, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_SCAN_FREQUENCIES={0x3c, 0x2c, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}]}, @NL80211_ATTR_IE={0x12, 0x2a, [@gcr_ga={0xbd, 0x6, @broadcast}, @chsw_timing={0x68, 0x4}]}, @NL80211_ATTR_SCAN_FLAGS={0x8}, @NL80211_ATTR_SCAN_FREQUENCIES={0x14, 0x2c, 0x0, 0x1, [{0x8}, {0x8, 0x0, 0x9dd}]}]}, 0x88}}, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f0020000", @ANYRES16=r3, @ANYBLOB="01044c5d4aa5080896833b00002008000300", @ANYRES32=r2, @ANYBLOB="d202330080010000080211000000080211"], 0x2f0}}, 0x0) 22:22:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72be95ae", @nested={0x40, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed8", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:22:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r5, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x4}, 0x40) 22:23:00 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:00 executing program 1: r0 = socket(0x2, 0x1, 0x0) getsockname$l2tp(r0, 0x0, &(0x7f0000000040)) 22:23:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x1fc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:00 executing program 4: socket(0x0, 0x8080f, 0x0) 22:23:01 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext, 0x8000, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r5, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:01 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x6000}, 0x0) 22:23:01 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 22:23:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x1fc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:02 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r5, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:02 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 22:23:02 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1a11c2, 0x0) fallocate(r0, 0x0, 0x0, 0x18ec) 22:23:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x1fc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:03 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x0, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:03 executing program 4: r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x1f}) 22:23:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r5, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:03 executing program 1: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f0000000000)="64e99e2989158f4894c49f8b3c953cd681328d6e014fdcdade29c043e524078c9d133eb31e395f73d1df5d04fe7fedac56ca9086b29bc841c3fb5070a3d203e6fc98cbca7228374c4e6a2b8cacfb0ff03fe31f11aca834181fa450e5f5be8548e56b3ff7c9fb3ff8a0974c5eab9c37db6317b972b92d133cc3774e8ede497d40e14a", 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0) rt_sigreturn() 22:23:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic, @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x1fc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 22:23:04 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040)) 22:23:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:04 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x0, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic, @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x1fc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') sendfile(r0, r1, 0x0, 0x800000880004105) 22:23:05 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) connect$inet(r0, &(0x7f0000001740)={0x2, 0x4e20, @local}, 0x10) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 22:23:05 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:06 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x0, 0x7f, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic, @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x1fc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='gfs2\x00', 0x40005, &(0x7f0000000100)='nv\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x4a87}, 0x1c) 22:23:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x264, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b5", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x264}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:07 executing program 4: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000380), 0x3, 0x0, 0x0, &(0x7f0000000440), 0x0) 22:23:07 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x6, 0xd9, 0x1}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d000000003957818efdb43e757ce17be01d69317bf3479e311ba3e5683aca8daa73eaf973e17f56fcfb708e2a642f0b9162bfb72944ec3f014575564293663ae750294f126b7dda8da3a5eaabf1d957d6c71107ff7f0d270c427c91acd572859b51a89b83e16c", 0x7e) recvmmsg(r1, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 22:23:08 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x264, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b5", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x264}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x0) 22:23:08 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x0, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:08 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x1ff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x4210c49271ef9bab, 0x0) fchdir(0xffffffffffffffff) 22:23:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x264, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b5", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x264}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x0) 22:23:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000100)={0x0, 0xdee, 0x5, 0x1, 0x6, 0xd9, 0x1}) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(r1, 0x0, 0x9e35, 0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d000000003957818efdb43e757ce17be01d69317bf3479e311ba3e5683aca8daa73eaf973e17f56fcfb708e2a642f0b9162bfb72944ec3f014575564293663ae750294f126b7dda8da3a5eaabf1d957d6c71107ff7f0d270c427c91acd572859b51a89b83e16ca2c692ea", 0x82) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) socket(0x11, 0x3, 0x0) 22:23:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x0) 22:23:10 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) 22:23:10 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:23:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x294, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x294}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:10 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x0, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 22:23:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @mcast1, 0xfffffffe}, 0x1c, 0x0}}], 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x40025) 22:23:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x294, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x294}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:11 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=""/128) 22:23:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r4, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) [ 783.569160][ T32] audit: type=1800 audit(1611094991.984:8): pid=15890 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16374 res=0 errno=0 [ 783.709066][ T32] audit: type=1800 audit(1611094992.054:9): pid=15890 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16374 res=0 errno=0 22:23:12 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x42801, 0x0) close(r0) 22:23:12 executing program 4: socket$key(0xf, 0x3, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x1ff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x5b3}) socket$nl_generic(0x10, 0x3, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) 22:23:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x294, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x294}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 22:23:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r3, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:13 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x0, 0x4, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:13 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10010, 0xc01, 0x64f6959f, 0x3, 0x8, 0x0, 0x7}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 22:23:13 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1022, 0xd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x2}, 0x8000, 0xf1f, 0x0, 0x0, 0x3c, 0x0, 0x1}, 0x0, 0xa, r1, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 22:23:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2ac, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2ac}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 785.056968][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:23:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r3, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) [ 785.469352][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:23:14 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000005040), 0x15f, 0x0) 22:23:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 22:23:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2ac, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2ac}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) io_submit(0x0, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:14 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x1ff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) 22:23:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = getpid() tkill(r3, 0x2f) 22:23:15 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x0, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 22:23:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2ac, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2ac}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:15 executing program 4: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 22:23:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) io_submit(0x0, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:16 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x3e8, 0x1, 0x4}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x600082, 0x0) fcntl$setpipe(r3, 0x407, 0x3) socket(0x11, 0x800000003, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x44883, 0x0) 22:23:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x1ff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) socket$inet6(0xa, 0x0, 0x0) 22:23:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, 0x0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d00", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2bc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) io_submit(0x0, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000100)={0x0, 0xdee, 0x0, 0x1, 0x0, 0xd9, 0x1}) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(r1, 0x0, 0x9e35, 0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x2, 0x0, 0x0, 0x4ba4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x25}, 0x0, 0x0, 0xffffffffffffffff, 0x5) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d000000003957818efdb43e757ce17be01d69317bf3479e311ba3e5683aca8daa73eaf973e17f56fcfb708e2a642f0b9162bfb72944ec3f014575564293663ae750294f126b7dda8da3a5eaabf1d957d6c71107ff7f0d270c427c91acd572859b51a89b83e16ca2c692ea", 0x82) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) socket(0x0, 0x800000003, 0x0) socket(0x11, 0x0, 0x0) 22:23:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, 0x0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:17 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x0, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:17 executing program 4: r0 = open(&(0x7f0000000240)='./file0\x00', 0x102e0, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)=0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 22:23:17 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) io_submit(r1, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x14000}]) 22:23:17 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d00", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2bc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, 0x0, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:18 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040), 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x4000000000000000}, {0x0, 0x989680}}, 0x0) 22:23:18 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) io_submit(r1, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x14000}]) [ 790.386342][T15981] not chained 10000 origins [ 790.390902][T15981] CPU: 1 PID: 15981 Comm: syz-executor.1 Not tainted 5.10.0-rc4-syzkaller #0 [ 790.393130][T15981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.393130][T15981] Call Trace: [ 790.393130][T15981] dump_stack+0x21c/0x280 [ 790.393130][T15981] kmsan_internal_chain_origin+0x6f/0x130 [ 790.393130][T15981] ? kmsan_get_metadata+0x116/0x180 [ 790.393130][T15981] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 790.393130][T15981] ? kmsan_get_metadata+0x116/0x180 [ 790.393130][T15981] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 790.393130][T15981] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 790.393130][T15981] ? __wake_up+0x1fc/0x250 [ 790.393130][T15981] ? kmsan_get_metadata+0x116/0x180 [ 790.393130][T15981] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 790.393130][T15981] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 790.393130][T15981] ? kmsan_get_metadata+0x116/0x180 [ 790.393130][T15981] ? kmsan_internal_set_origin+0x85/0xc0 [ 790.393130][T15981] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 790.393130][T15981] ? _copy_from_user+0x1fd/0x300 [ 790.393130][T15981] ? kmsan_get_metadata+0x116/0x180 [ 790.393130][T15981] __msan_chain_origin+0x57/0xa0 [ 790.393130][T15981] __get_compat_msghdr+0x6db/0x9d0 [ 790.393130][T15981] get_compat_msghdr+0x108/0x2b0 [ 790.393130][T15981] do_recvmmsg+0xdd1/0x22f0 [ 790.393130][T15981] ? kmsan_get_metadata+0x116/0x180 [ 790.393130][T15981] ? _copy_from_user+0x1fd/0x300 [ 790.393130][T15981] ? kmsan_get_metadata+0x116/0x180 [ 790.393130][T15981] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 790.393130][T15981] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 790.393130][T15981] ? get_old_timespec32+0x2ac/0x350 [ 790.393130][T15981] __sys_recvmmsg+0x309/0x6f0 [ 790.393130][T15981] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 790.393130][T15981] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 790.393130][T15981] __do_fast_syscall_32+0x102/0x160 [ 790.393130][T15981] do_fast_syscall_32+0x6a/0xc0 [ 790.393130][T15981] do_SYSENTER_32+0x73/0x90 [ 790.393130][T15981] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 790.393130][T15981] RIP: 0023:0xf7f8c549 [ 790.393130][T15981] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 790.393130][T15981] RSP: 002b:00000000f55440cc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 790.393130][T15981] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000020002ec0 [ 790.393130][T15981] RDX: 0000000000000ec0 RSI: 0000000000000002 RDI: 00000000200001c0 [ 790.393130][T15981] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 790.393130][T15981] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 790.393130][T15981] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 790.393130][T15981] Uninit was stored to memory at: [ 790.393130][T15981] kmsan_internal_chain_origin+0xad/0x130 [ 790.393130][T15981] __msan_chain_origin+0x57/0xa0 [ 790.393130][T15981] __get_compat_msghdr+0x6db/0x9d0 [ 790.393130][T15981] get_compat_msghdr+0x108/0x2b0 [ 790.393130][T15981] do_recvmmsg+0xdd1/0x22f0 [ 790.393130][T15981] __sys_recvmmsg+0x309/0x6f0 [ 790.393130][T15981] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 790.393130][T15981] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 790.393130][T15981] __do_fast_syscall_32+0x102/0x160 [ 790.393130][T15981] do_fast_syscall_32+0x6a/0xc0 [ 790.393130][T15981] do_SYSENTER_32+0x73/0x90 [ 790.393130][T15981] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 790.393130][T15981] [ 790.393130][T15981] Uninit was stored to memory at: [ 790.393130][T15981] kmsan_internal_chain_origin+0xad/0x130 [ 790.393130][T15981] __msan_chain_origin+0x57/0xa0 [ 790.393130][T15981] __get_compat_msghdr+0x6db/0x9d0 [ 790.393130][T15981] get_compat_msghdr+0x108/0x2b0 [ 790.393130][T15981] do_recvmmsg+0xdd1/0x22f0 [ 790.393130][T15981] __sys_recvmmsg+0x309/0x6f0 [ 790.393130][T15981] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 790.393130][T15981] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 790.393130][T15981] __do_fast_syscall_32+0x102/0x160 [ 790.393130][T15981] do_fast_syscall_32+0x6a/0xc0 [ 790.393130][T15981] do_SYSENTER_32+0x73/0x90 [ 790.393130][T15981] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 790.393130][T15981] [ 790.393130][T15981] Uninit was stored to memory at: [ 790.393130][T15981] kmsan_internal_chain_origin+0xad/0x130 [ 790.393130][T15981] __msan_chain_origin+0x57/0xa0 [ 790.393130][T15981] __get_compat_msghdr+0x6db/0x9d0 [ 790.393130][T15981] get_compat_msghdr+0x108/0x2b0 [ 790.393130][T15981] do_recvmmsg+0xdd1/0x22f0 [ 790.393130][T15981] __sys_recvmmsg+0x309/0x6f0 [ 790.393130][T15981] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 790.393130][T15981] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 790.393130][T15981] __do_fast_syscall_32+0x102/0x160 [ 790.393130][T15981] do_fast_syscall_32+0x6a/0xc0 [ 790.393130][T15981] do_SYSENTER_32+0x73/0x90 [ 790.393130][T15981] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 790.393130][T15981] [ 790.393130][T15981] Uninit was stored to memory at: [ 790.393130][T15981] kmsan_internal_chain_origin+0xad/0x130 [ 790.393130][T15981] __msan_chain_origin+0x57/0xa0 [ 790.393130][T15981] __get_compat_msghdr+0x6db/0x9d0 [ 790.393130][T15981] get_compat_msghdr+0x108/0x2b0 [ 790.393130][T15981] do_recvmmsg+0xdd1/0x22f0 [ 790.393130][T15981] __sys_recvmmsg+0x309/0x6f0 [ 790.393130][T15981] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 790.393130][T15981] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 790.393130][T15981] __do_fast_syscall_32+0x102/0x160 [ 790.393130][T15981] do_fast_syscall_32+0x6a/0xc0 [ 790.393130][T15981] do_SYSENTER_32+0x73/0x90 [ 790.393130][T15981] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 790.393130][T15981] [ 790.393130][T15981] Uninit was stored to memory at: [ 790.393130][T15981] kmsan_internal_chain_origin+0xad/0x130 [ 790.393130][T15981] __msan_chain_origin+0x57/0xa0 [ 790.393130][T15981] __get_compat_msghdr+0x6db/0x9d0 [ 790.393130][T15981] get_compat_msghdr+0x108/0x2b0 [ 790.393130][T15981] do_recvmmsg+0xdd1/0x22f0 [ 790.393130][T15981] __sys_recvmmsg+0x309/0x6f0 [ 790.393130][T15981] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 790.393130][T15981] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 790.393130][T15981] __do_fast_syscall_32+0x102/0x160 [ 790.393130][T15981] do_fast_syscall_32+0x6a/0xc0 [ 790.393130][T15981] do_SYSENTER_32+0x73/0x90 [ 790.393130][T15981] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 790.393130][T15981] [ 790.393130][T15981] Uninit was stored to memory at: [ 790.393130][T15981] kmsan_internal_chain_origin+0xad/0x130 [ 790.393130][T15981] __msan_chain_origin+0x57/0xa0 [ 790.393130][T15981] __get_compat_msghdr+0x6db/0x9d0 [ 790.393130][T15981] get_compat_msghdr+0x108/0x2b0 [ 790.393130][T15981] do_recvmmsg+0xdd1/0x22f0 [ 790.393130][T15981] __sys_recvmmsg+0x309/0x6f0 [ 790.393130][T15981] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 790.393130][T15981] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 790.393130][T15981] __do_fast_syscall_32+0x102/0x160 [ 790.393130][T15981] do_fast_syscall_32+0x6a/0xc0 [ 790.393130][T15981] do_SYSENTER_32+0x73/0x90 [ 790.393130][T15981] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 790.393130][T15981] [ 790.393130][T15981] Uninit was stored to memory at: [ 790.393130][T15981] kmsan_internal_chain_origin+0xad/0x130 [ 790.393130][T15981] __msan_chain_origin+0x57/0xa0 [ 790.393130][T15981] __get_compat_msghdr+0x6db/0x9d0 [ 790.393130][T15981] get_compat_msghdr+0x108/0x2b0 [ 790.393130][T15981] do_recvmmsg+0xdd1/0x22f0 [ 790.393130][T15981] __sys_recvmmsg+0x309/0x6f0 [ 790.393130][T15981] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 790.393130][T15981] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 790.393130][T15981] __do_fast_syscall_32+0x102/0x160 [ 790.393130][T15981] do_fast_syscall_32+0x6a/0xc0 [ 790.393130][T15981] do_SYSENTER_32+0x73/0x90 [ 790.393130][T15981] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 790.393130][T15981] [ 790.393130][T15981] Local variable ----msg_sys@do_recvmmsg created at: [ 790.393130][T15981] do_recvmmsg+0xbf/0x22f0 [ 790.393130][T15981] do_recvmmsg+0xbf/0x22f0 22:23:19 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2bc, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d00", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2bc}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x66, &(0x7f00000001c0)="6bfa4009ab5a8cbe0d19666ae3d46efe0d63d71c1cc926c00800000000000000f9f2b7213c070c9d2b0454ebb7f16493adcd767db004ddd45109ab45ce894bc5918b66f53424b8aef30f2b361dbc01000100025abf8f82aa2e6691361570d71ac3b72b982cc1"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 22:23:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x6, 0xd9, 0x1}) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x2, 0x0, 0x0, 0x4ba4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x25}, 0x0, 0x0, 0xffffffffffffffff, 0x5) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d000000003957818efdb43e757ce17be01d69317bf3479e311ba3e5683aca8daa73eaf973e17f56fcfb708e2a642f0b9162bfb72944ec3f014575564293663ae750294f126b7dda8da3a5eaabf1d957d6c71107ff7f0d270c427c91acd572859b51a89b83e16ca2c692ea", 0x82) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) socket(0x11, 0x3, 0x0) 22:23:20 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x0, 0x1, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:23:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:21 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) io_submit(r1, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x14000}]) 22:23:21 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="4f00ef1b8461d699df868cfc85dbc0d4719ed6c26d167c428f248a4d820aab9e6bdb0a694ef04d8aa6d347ed5ad3dc836d507092ba1d68c0dd40733afd50283f816945e9cae55fa746a18ad09b9f75476e8039e713e0f9dceca6d976a04cce31535e928de78856ec26260d430168e6ffbc44a42de9510ea61685154f6435b769f42a9d3f16c17e3e588769a2534d886c234cd8f63425f4ff095f47fa2df3b0cc9ba81632917dd073b4a53314b86ab29f9ec82140c350503d5e6c0cb2a78477476dc671a62626f62f920121d2b48ec651d6a132a72db18957d445c87ca24d43fbf3e270ea5235aecd7a8d6968332208c395f6cd72a0452f4d8dde64d45b", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 793.461360][T16027] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:23:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x2}]}, 0x3c}}, 0x0) 22:23:22 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r3, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:22 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x0, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:22 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0xac, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x52697482, 0x1, @perf_bp={0x0, 0x7}, 0x0, 0xc01, 0x64f6959f, 0x3, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xa, r1, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000580)={0x0, 0x0, {0x0, @struct}, {}, {0x0, @struct}}) sendto$inet6(r3, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) [ 794.970004][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:23:24 executing program 4: clone3(&(0x7f00000005c0)={0x0, &(0x7f0000000380), 0x0, 0x0, {0x1}, &(0x7f0000000440)=""/49, 0x31, 0x0, 0x0}, 0x58) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:23:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x34}}, 0x0) 22:23:24 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r3, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:24 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x0, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:24 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c0}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:24 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000)=0x2, 0x1, 0x2, 0x0, 0x0, 0x0) 22:23:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x34}}, 0x0) 22:23:25 executing program 1: syz_open_dev$dri(&(0x7f0000000800)='/dev/dri/card#\x00', 0x0, 0x0) 22:23:25 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r3, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:25 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:25 executing program 4: sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x0) 22:23:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x34}}, 0x0) 22:23:25 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) set_robust_list(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 22:23:25 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)={0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="71b6664e25326ab5202ed289bcba6344be4b5ed90dfd3c8a05ab1931d9d5d07b82ed0c3e6660b6ba1dcbdb67f6d44239bb5afefcc4b797d909c998bdf0c08a9324b2d397b0a96633105d9059c0994e1e508a2f377589c88cdfc19ffd98ba373c838d1a23b581e9f0eef9105eba8a13187a5fbf90eec13a7b5f9e7f17e1cb1ca6bbbed8413200dc1af9304dd7efc561e44ffc96174abe0c2d4206b5fc465209128a25381fd57eb9db7f559f4b63898696737ecf9bc13e73b978c0662d009cfb84edd3df959c72", @nested={0x41, 0x0, 0x0, 0x1, [@generic="01da25d5bb08b1c120bed87d80a211c8a4670d6c020ccbc957f03561ce5de30a0438348bb6d6fc9ffdcae9473365393df8e05acb01fc9ed821", @typed={0x4}]}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @nested={0x199, 0x0, 0x0, 0x1, [@generic="f340cd71cdb110ff24d59e218ab216e2bd8431b27103568dff56afa299ce9fcd8f8550fbda31021080be7b5c18506fecd802440ed9dee5d9e1e60ff2c42532613afebe67970e4ad1db0c455bea915b450329dd8c05910812a7de36086f359cea0f3f3632d6c65334697ed93ae66d3fb0a977aef7e2ca457aa505bd72b8d74ad69c2256f5de", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @generic="183d8ca938d3ce872e4e09"]}]}, 0x2c4}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 22:23:26 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r3, 0x0) io_submit(r2, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x14000}]) 22:23:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x933e6000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x81, 0x4d, 0x7, 0x3f, 0x0, 0x800, 0x20000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x0, 0x8}, 0x8000, 0x7f, 0x4, 0x0, 0x8, 0x27, 0x8}, 0xffffffffffffffff, 0x7, r1, 0x1) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 22:23:26 executing program 4: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x0) clone3(&(0x7f0000000540)={0x5a007000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x0, 0x309440) openat$cgroup_root(0xffffff9c, &(0x7f0000000700)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000740)='NLBL_UNLBL\x00') 22:23:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r1, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8}]}, 0x3c}}, 0x0) [ 797.880981][ C1] ===================================================== [ 797.887048][ C1] BUG: KMSAN: uninit-value in gre_parse_header+0x1b2d/0x1e70 [ 797.893429][ C1] CPU: 1 PID: 16086 Comm: syz-executor.1 Not tainted 5.10.0-rc4-syzkaller #0 [ 797.893429][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 797.893429][ C1] Call Trace: [ 797.893429][ C1] [ 797.893429][ C1] dump_stack+0x21c/0x280 [ 797.923350][ C1] kmsan_report+0xfb/0x1e0 [ 797.923350][ C1] __msan_warning+0x5f/0xa0 [ 797.923350][ C1] gre_parse_header+0x1b2d/0x1e70 [ 797.923350][ C1] ? kmsan_get_metadata+0x116/0x180 [ 797.923350][ C1] gre_rcv+0x203/0x1e90 [ 797.923350][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 797.953391][ C1] ? raw_local_deliver+0xe4/0x1d90 [ 797.953391][ C1] ? nf_confirm+0x6e3/0x830 [ 797.953391][ C1] ? kmsan_get_metadata+0x116/0x180 [ 797.953391][ C1] ? erspan_build_header_v2+0x6a0/0x6a0 [ 797.953391][ C1] gre_rcv+0x321/0x410 [ 797.953391][ C1] ? gre_parse_header+0x1e70/0x1e70 [ 797.983453][ C1] ip_protocol_deliver_rcu+0x572/0xc50 [ 797.983453][ C1] ip_local_deliver+0x585/0x8d0 [ 797.983453][ C1] ? ip_local_deliver+0x8d0/0x8d0 [ 797.983453][ C1] ? ip_protocol_deliver_rcu+0xc50/0xc50 [ 797.983453][ C1] ip_rcv+0x599/0x820 [ 797.983453][ C1] ? ip_rcv_core+0x1480/0x1480 [ 798.011902][ C1] __netif_receive_skb+0x1ec/0x640 [ 798.011902][ C1] ? kmsan_internal_set_origin+0x85/0xc0 [ 798.011902][ C1] ? ip_local_deliver_finish+0x370/0x370 [ 798.011902][ C1] process_backlog+0x517/0xbd0 [ 798.011902][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 798.011902][ C1] napi_poll+0x40a/0x1020 [ 798.011902][ C1] ? kmsan_internal_set_origin+0x85/0xc0 [ 798.011902][ C1] net_rx_action+0x34c/0xd30 [ 798.011902][ C1] ? net_tx_action+0xd30/0xd30 [ 798.011902][ C1] __do_softirq+0x1a9/0x6fa [ 798.011902][ C1] asm_call_irq_on_stack+0xf/0x20 [ 798.011902][ C1] [ 798.011902][ C1] do_softirq_own_stack+0x6e/0x90 [ 798.011902][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 798.011902][ C1] local_bh_enable+0x36/0x40 [ 798.087426][ C1] ip_finish_output2+0x2454/0x2940 [ 798.087426][ C1] ? __msan_get_context_state+0x9/0x20 [ 798.087426][ C1] ? rcu_read_unlock_strict+0x9/0x10 [ 798.087426][ C1] ? nf_ct_deliver_cached_events+0x610/0x7e0 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] __ip_finish_output+0xd08/0x1090 [ 798.087426][ C1] ip_finish_output+0x329/0x480 [ 798.087426][ C1] ip_output+0x32e/0x6d0 [ 798.087426][ C1] ? ip_mc_finish_output+0x770/0x770 [ 798.087426][ C1] ? ip_finish_output+0x480/0x480 [ 798.087426][ C1] ip_send_skb+0x194/0x350 [ 798.087426][ C1] udp_send_skb+0x152d/0x1bc0 [ 798.087426][ C1] udp_sendmsg+0x3e7b/0x48f0 [ 798.087426][ C1] ? ip_do_fragment+0x3b50/0x3b50 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 798.087426][ C1] ? inet_send_prepare+0x92/0x6b0 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] ? udp_cmsg_send+0x710/0x710 [ 798.087426][ C1] inet_sendmsg+0x15b/0x1d0 [ 798.087426][ C1] ____sys_sendmsg+0xcfc/0x12f0 [ 798.087426][ C1] ? inet_send_prepare+0x6b0/0x6b0 [ 798.087426][ C1] __sys_sendmmsg+0x882/0x1070 [ 798.087426][ C1] ? kmsan_internal_check_memory+0xb1/0x520 [ 798.087426][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 798.087426][ C1] ? should_fail+0x72/0x9e0 [ 798.087426][ C1] ? _copy_to_user+0x1d2/0x270 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 798.087426][ C1] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 798.087426][ C1] __do_fast_syscall_32+0x102/0x160 [ 798.087426][ C1] do_fast_syscall_32+0x6a/0xc0 [ 798.087426][ C1] do_SYSENTER_32+0x73/0x90 [ 798.087426][ C1] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 798.087426][ C1] RIP: 0023:0xf7f8c549 [ 798.087426][ C1] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 798.087426][ C1] RSP: 002b:00000000f55860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000159 [ 798.087426][ C1] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020007fc0 [ 798.087426][ C1] RDX: 0000000000000075 RSI: 0000000000000000 RDI: 0000000000000000 [ 798.087426][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 798.087426][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 798.087426][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 798.087426][ C1] [ 798.087426][ C1] Uninit was stored to memory at: [ 798.087426][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 798.087426][ C1] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 798.087426][ C1] kmsan_memcpy_metadata+0xb/0x10 [ 798.087426][ C1] __msan_memcpy+0x46/0x60 [ 798.087426][ C1] pskb_expand_head+0x3d6/0x1e20 [ 798.087426][ C1] ip_tunnel_xmit+0x3010/0x3a80 [ 798.087426][ C1] erspan_xmit+0x20c6/0x3260 [ 798.087426][ C1] xmit_one+0x2b6/0x760 [ 798.087426][ C1] dev_hard_start_xmit+0x196/0x420 [ 798.087426][ C1] sch_direct_xmit+0x57c/0x1a60 [ 798.087426][ C1] __qdisc_run+0x35b/0x490 [ 798.087426][ C1] __dev_queue_xmit+0x26a1/0x4590 [ 798.087426][ C1] dev_queue_xmit+0x4b/0x60 [ 798.087426][ C1] neigh_resolve_output+0xc65/0xcf0 [ 798.087426][ C1] ip_finish_output2+0x1d18/0x2940 [ 798.087426][ C1] __ip_finish_output+0xd08/0x1090 [ 798.087426][ C1] ip_finish_output+0x329/0x480 [ 798.087426][ C1] ip_output+0x32e/0x6d0 [ 798.087426][ C1] ip_send_skb+0x194/0x350 [ 798.087426][ C1] udp_send_skb+0x152d/0x1bc0 [ 798.087426][ C1] udp_sendmsg+0x3e7b/0x48f0 [ 798.087426][ C1] inet_sendmsg+0x15b/0x1d0 [ 798.087426][ C1] ____sys_sendmsg+0xcfc/0x12f0 [ 798.087426][ C1] __sys_sendmmsg+0x882/0x1070 [ 798.087426][ C1] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 798.087426][ C1] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 798.087426][ C1] __do_fast_syscall_32+0x102/0x160 [ 798.087426][ C1] do_fast_syscall_32+0x6a/0xc0 [ 798.087426][ C1] do_SYSENTER_32+0x73/0x90 [ 798.087426][ C1] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 798.087426][ C1] [ 798.087426][ C1] Uninit was created at: [ 798.087426][ C1] kmsan_internal_poison_shadow+0x5c/0xf0 [ 798.087426][ C1] kmsan_slab_alloc+0x8d/0xe0 [ 798.087426][ C1] __kmalloc_node_track_caller+0xa48/0x1610 [ 798.087426][ C1] __alloc_skb+0x318/0xb00 [ 798.087426][ C1] alloc_skb_with_frags+0x1f3/0xc10 [ 798.087426][ C1] sock_alloc_send_pskb+0xcc4/0xe80 [ 798.087426][ C1] sock_alloc_send_skb+0xca/0xe0 [ 798.087426][ C1] __ip_append_data+0x455d/0x62f0 [ 798.087426][ C1] ip_make_skb+0x409/0x920 [ 798.087426][ C1] udp_sendmsg+0x3d7c/0x48f0 [ 798.087426][ C1] inet_sendmsg+0x15b/0x1d0 [ 798.087426][ C1] ____sys_sendmsg+0xcfc/0x12f0 [ 798.087426][ C1] __sys_sendmmsg+0x882/0x1070 [ 798.087426][ C1] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 798.087426][ C1] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 798.087426][ C1] __do_fast_syscall_32+0x102/0x160 [ 798.087426][ C1] do_fast_syscall_32+0x6a/0xc0 [ 798.087426][ C1] do_SYSENTER_32+0x73/0x90 [ 798.087426][ C1] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 798.087426][ C1] ===================================================== [ 798.087426][ C1] Disabling lock debugging due to kernel taint [ 798.087426][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 798.087426][ C1] CPU: 1 PID: 16086 Comm: syz-executor.1 Tainted: G B 5.10.0-rc4-syzkaller #0 [ 798.087426][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 798.087426][ C1] Call Trace: [ 798.087426][ C1] [ 798.087426][ C1] dump_stack+0x21c/0x280 [ 798.087426][ C1] panic+0x4c6/0xea7 [ 798.087426][ C1] ? add_taint+0x17c/0x210 [ 798.087426][ C1] kmsan_report+0x1de/0x1e0 [ 798.087426][ C1] __msan_warning+0x5f/0xa0 [ 798.087426][ C1] gre_parse_header+0x1b2d/0x1e70 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] gre_rcv+0x203/0x1e90 [ 798.087426][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 798.087426][ C1] ? raw_local_deliver+0xe4/0x1d90 [ 798.087426][ C1] ? nf_confirm+0x6e3/0x830 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] ? erspan_build_header_v2+0x6a0/0x6a0 [ 798.087426][ C1] gre_rcv+0x321/0x410 [ 798.087426][ C1] ? gre_parse_header+0x1e70/0x1e70 [ 798.087426][ C1] ip_protocol_deliver_rcu+0x572/0xc50 [ 798.087426][ C1] ip_local_deliver+0x585/0x8d0 [ 798.087426][ C1] ? ip_local_deliver+0x8d0/0x8d0 [ 798.087426][ C1] ? ip_protocol_deliver_rcu+0xc50/0xc50 [ 798.087426][ C1] ip_rcv+0x599/0x820 [ 798.087426][ C1] ? ip_rcv_core+0x1480/0x1480 [ 798.087426][ C1] __netif_receive_skb+0x1ec/0x640 [ 798.087426][ C1] ? kmsan_internal_set_origin+0x85/0xc0 [ 798.087426][ C1] ? ip_local_deliver_finish+0x370/0x370 [ 798.087426][ C1] process_backlog+0x517/0xbd0 [ 798.087426][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 798.087426][ C1] napi_poll+0x40a/0x1020 [ 798.087426][ C1] ? kmsan_internal_set_origin+0x85/0xc0 [ 798.087426][ C1] net_rx_action+0x34c/0xd30 [ 798.087426][ C1] ? net_tx_action+0xd30/0xd30 [ 798.087426][ C1] __do_softirq+0x1a9/0x6fa [ 798.087426][ C1] asm_call_irq_on_stack+0xf/0x20 [ 798.087426][ C1] [ 798.087426][ C1] do_softirq_own_stack+0x6e/0x90 [ 798.087426][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 798.087426][ C1] local_bh_enable+0x36/0x40 [ 798.087426][ C1] ip_finish_output2+0x2454/0x2940 [ 798.087426][ C1] ? __msan_get_context_state+0x9/0x20 [ 798.087426][ C1] ? rcu_read_unlock_strict+0x9/0x10 [ 798.087426][ C1] ? nf_ct_deliver_cached_events+0x610/0x7e0 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] __ip_finish_output+0xd08/0x1090 [ 798.087426][ C1] ip_finish_output+0x329/0x480 [ 798.087426][ C1] ip_output+0x32e/0x6d0 [ 798.087426][ C1] ? ip_mc_finish_output+0x770/0x770 [ 798.087426][ C1] ? ip_finish_output+0x480/0x480 [ 798.087426][ C1] ip_send_skb+0x194/0x350 [ 798.087426][ C1] udp_send_skb+0x152d/0x1bc0 [ 798.087426][ C1] udp_sendmsg+0x3e7b/0x48f0 [ 798.087426][ C1] ? ip_do_fragment+0x3b50/0x3b50 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 798.087426][ C1] ? inet_send_prepare+0x92/0x6b0 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] ? udp_cmsg_send+0x710/0x710 [ 798.087426][ C1] inet_sendmsg+0x15b/0x1d0 [ 798.087426][ C1] ____sys_sendmsg+0xcfc/0x12f0 [ 798.087426][ C1] ? inet_send_prepare+0x6b0/0x6b0 [ 798.087426][ C1] __sys_sendmmsg+0x882/0x1070 [ 798.087426][ C1] ? kmsan_internal_check_memory+0xb1/0x520 [ 798.087426][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 798.087426][ C1] ? should_fail+0x72/0x9e0 [ 798.087426][ C1] ? _copy_to_user+0x1d2/0x270 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] ? kmsan_get_metadata+0x116/0x180 [ 798.087426][ C1] __se_compat_sys_sendmmsg+0xcd/0xf0 [ 798.087426][ C1] __ia32_compat_sys_sendmmsg+0x56/0x70 [ 798.087426][ C1] __do_fast_syscall_32+0x102/0x160 [ 798.087426][ C1] do_fast_syscall_32+0x6a/0xc0 [ 798.087426][ C1] do_SYSENTER_32+0x73/0x90 [ 798.087426][ C1] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 798.087426][ C1] RIP: 0023:0xf7f8c549 [ 798.087426][ C1] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 798.087426][ C1] RSP: 002b:00000000f55860cc EFLAGS: 00000296 ORIG_RAX: 0000000000000159 [ 798.087426][ C1] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020007fc0 [ 798.087426][ C1] RDX: 0000000000000075 RSI: 0000000000000000 RDI: 0000000000000000 [ 798.087426][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 798.087426][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 798.087426][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 798.087426][ C1] Kernel Offset: disabled [ 798.087426][ C1] Rebooting in 86400 seconds..