1d976f2108535ec8f1ee90fee65ce1fb82f822ee18ea6f57af8db0f43474c85d7ea94529285d08debe6c7dc5cbd92ef8445161cd12052a32895bd7c36bb8c906b77451c3c5b2278d8a53eeb2b678e62cfff0f7de7acfeede184f034082e617df1e0f11f80197095be3291b59e19bcf3247211bc91cf74bd184fc964e7839bf08688a0db1a78be21bd168740f959c3c77abc5666e5fda75a54ac9c9df3faa233f2fbbc349a0f4831c7f84fe5f5a5b516db9869226d895beb6aa445b1420706c3ec1f010db4e56ffb21fc0eac3f69e75765aefc87631e5739d6fea3b177909efff23dace7bc32635a93bc204615663fb586b73bf5549f21c9cbecf0ded1e8009b2a0268573536a3d502c14ff89e19795a0fc4cfc7e5dd428fb40b8fa5e1ec917155d5a5b98eb31b66c50c2b3232598307e21ba012ca072040d99f580cb82c9b4d61bd85706c925006f523d993dbb33d5fdb675bdc59e42eba0d93511e38759ec6e1aaf3566dad1cf5f0a31736fcee324da62d1b6c4ddabe2dd26d1e109db5ed7d0441c3fdf31a62d3012452cb356d30e5212d353828bd5145359920b8265e900a832ac02b09f749d48ec9e1695cb9c261825326362914853385f5cea84e32face43e6edc9ddb6180571ddf07925372c037d4c6dfb4734a84da2e3fe32d2f09f4e949538fed6febdf0660862e64eb19a5357c37b90db31264f41c00b50aeadc354ea2a4ec62fea76d6a6468c3f3c236ccb72bc04cc3a2f97263d52dee4a7cf14df46e8356bf228421518824d79d6dba79d435df28c8fbfcae47bd7daa54acad36267209eaeeeb655b8a39c1d45176807f7579e2ae4926730a1aedabbfa00cc000f3952597c619fc0bdd8e6a34f84068546e663d9d4d514a297eedbb25a8e39740a284a8fbde22e68aa149a497ade209571c21a6ea51e45cd8b78cea09976c20d9c5c764971834b3639ea64744c1fa4c1600992a8b7c808e53b697f0de987be37c4528362a65f99ba436627bb6cc20b362f4055937f89427320553b42e7fcc137b28c2e277864055655642a34f78ca6b81a0afafc1efc7e4902ad02a656d0e0e58d5f040815a01362ee4781a5f10653b4aefd434cbc4f7bd5d18afc07de4642e758da83c9b9a1aa1ac9224c0f1e5e8f267a8e337f987a49621903bc43b51a75dba9cae035aecee30a6e909c2df01b8a806a199325f33e107021a5947aef3d280331f9bff5602b463c3372fed35a037a261fd3f91a3f49a42f84b9589c952c1587eb2c9c2d6897e08b67a41a0de4b401415625d85d49b5126f32397ca6f1a7696e072f479acb477e5cb2af42627c4cb411e903b8429365b20543dd4b72bcb1be6ba31afce90654e4fed5de80b5fad7b9fbedf17defb0810dc78cb084384912bf783a6114438699ec257454a80678552db658efc1564035b54a9bfe84e25b462cb14b44cb1606163652d7dc9e6bf310a35277e0753a212a2556f8e40629f433f1220885db1d2a72678147bf7b752d05624664a5387f00fe59f7bdad107ee20eedddbb0fb72246972849c82176928266a4d9237d467110efe5324c3eabfccc9deedf7a94685945ddb4e7267821d3a71299f385edfe8c2f9fc26c699641d37b1918596cf809551c678bc9380706d26370d3a2cb392f28ad1862d4f73f7ebf58bf9773a886b4874c001acb12de56c1ce69bf50c5955a3c3d2278200b9d6b3c63485cc35b3b6d24a433266fde3a708b06c347055216f4d1ce2af78cedb190eb34344bc42428712bd1eee9b7ec16fa0f1669b8214a44cfc961dc57679e32f5318d4a62ca02cf2932d99b7bef34f062c0f1f0178cbadded82ee0efb71cc46ea87e3b14867a4fb532b99cae478bd109f62fc0f6a10725e295a967ce597e673026371fe3d14d282ccb0d31654af5be7d207fb88b707d8b60bd61ec4e02af6cad7cd73635c222837755c213442d379ddd4acf320529ddccdd124a8c1b39662127ff019ea09f2de19a7b82dc9aa8b9ea59550220a3f82d79067a1df55c994cce45abbece95c7d7dbb7edde79012c165936d6edad330018d4baca7b55c703c70b74945fee67ce15a858aca67735ebb92fa60b53fed6e6c974445ac6e5852ab2936c715b72c4b2231ee445d69aea66f20f7bf75af4575a1e9fc85cad0f45e2be158cdfba67fd7bf4091ef9b00e0391a16d095718e416c4bddcb11bc989", 0x1000}, {&(0x7f0000001a00)="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", 0xfb}, {&(0x7f0000001b00)="034a7721d08b9db04b7773affc5efcf0b7eea3d0b79e2c9b5bdd19c89851edf5feb82e1384119ab61d15eda3eccf2965f6e8813406f423dccc1e95150139c5bea209ce1c006c52b69b7651dd6b2a8627795d100a1cc3d75b4f4d03a26aa10d7c6f40ee20d1a8c168e6adf65d90b516acf485c56e2f3d84b14c4b94d0261787ca8297e5851099b429102f154c76bcf0b2", 0x90}, {&(0x7f0000001bc0)}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)="0a0ae64d1832922966c9e00fa408ec3eab750205db3f0a03c3cd4be836a5f578f68771a5db43900a5b92492a4ea628bb80c77013f83f4a57e7de7450ff61ddb1e6bcc4278b7dd8eee7f1cec0613d3084cb1ca2eee81889de9410c0e91eb65384669e556391e4b283018538e1972d2472b22ef6535801c34932f183", 0x7b}], 0x9, &(0x7f00000110c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x54, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xa3, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @empty, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @dev={0xac, 0x14, 0x14, 0x35}]}, @timestamp={0x44, 0x18, 0xee, 0x0, 0x6, [0x1, 0xb14, 0x8, 0x6, 0x4]}, @lsrr={0x83, 0xf, 0x2c, [@multicast1, @multicast2, @empty]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4e}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_retopts={{0x34, 0x0, 0x7, {[@noop, @rr={0x7, 0x23, 0x69, [@local, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast1, @loopback, @dev={0xac, 0x14, 0x14, 0x27}, @broadcast]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_retopts={{0x100, 0x0, 0x7, {[@timestamp_addr={0x44, 0x2c, 0xb6, 0x1, 0x2, [{@remote}, {@local, 0x6}, {@empty, 0x5}, {@rand_addr=0x64010100, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xa37}]}, @cipso={0x86, 0x7d, 0x3, [{0x0, 0xc, "f4521f5ea1e97d652e31"}, {0x5, 0xf, "dfad1460b5b9e1fde3c1ed7dba"}, {0x6, 0x11, "6a25cc516742499bf6f7fd476780cf"}, {0x1, 0xb, "51edb583fdd3c64bee"}, {0x7, 0xc, "3174fbfb762dd108a5a9"}, {0x0, 0x11, "6600b70b1dc88d1d2744cafb741b83"}, {0x5, 0x10, "32e3b0d194cd8de72724cca3e59a"}, {0x7, 0x4, '%q'}, {0x6, 0xf, "a3c08894cd1183a1a9bb1cc876"}]}, @timestamp={0x44, 0x10, 0x81, 0x0, 0x2, [0x2e7a85a3, 0x8, 0x3]}, @lsrr={0x83, 0x7, 0x43, [@multicast1]}, @rr={0x7, 0x27, 0x94, [@private=0xa010100, @private=0xa010100, @multicast2, @multicast1, @remote, @multicast2, @rand_addr=0x64010102, @loopback, @broadcast]}, @generic={0x82, 0x7, "a6ceab21dd"}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x38}, @empty}}}, @ip_retopts={{0x38, 0x0, 0x7, {[@cipso={0x86, 0x28, 0x3, [{0x7, 0x3, 'S'}, {0x1, 0xe, "3e4d60f0b80fd8a6405019e4"}, {0x1, 0x11, "fcc0f7eb20658bf25cf062bf96861c"}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}], 0x260}, 0x20040810) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000011500)={0x0, 0x3, &(0x7f0000011380)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f00000113c0)='syzkaller\x00', 0x7, 0x64, &(0x7f0000011400)=""/100, 0x41000, 0x11, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000011480)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000114c0)={0x4, 0xc, 0xfffffffc, 0xb83}, 0x10}, 0x78) 14:57:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:48 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.events\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)=@rc={0x1f, @fixed={[], 0x12}, 0xff}, 0x80, 0x0, 0x0, 0x0, 0x12a0}, 0x8000) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f00000015c0)={0x2, 0x70, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xb, 0x0, 0x3f, &(0x7f0000000040)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x5452, 0x4fc002) sendmsg$kcm(r2, &(0x7f00000000c0)={&(0x7f0000000180)=@generic={0x4, "22291d82d7713ee620bb72af23d213c66fe207903666641f08faecbc69f5491e40c5ff6a29beed810365a1d599c5fd39462af62af40d8f7bbb510865a105b720e2f83e7b4af0a6809adb19cbd2394b10db629760978f1c62ca7fa827502f74318a1ba280f635966c26e653eebdc8c661cf32524846d87286c7416aba670e"}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000440)="5aa6ea36baad21db23835366aad47aa18105c3ef2b46f6ec70174f9f6d32482d99c835c64c3b7fd108b5a4e7025980a2b8b333e0402601abebc0776ea692ce39ead544be28b728299d8d52b466c5d8d745da121e8339ab9d8a25a9638ba7dc23e19970ddc48644d902b1d55411f77f1278547963409f2744e987121f43803ff2d5593846dc7b895e1f41959c3e53b4c92eaf36b454db308856d86482207ed1e46cdaa87723526bee442234787ed1c07b3f389a2739092ebcdb09ec21ac09034a6fa353cbcda877deb73aa934e0f41d779c5a16d0108b5fe76add2dfe69f0378c4f9714dfc388a1b6a0d0", 0xea}, {&(0x7f0000000540)="9e9b8359d9b70b056e5792af3a45f2990600cb2b092a4dad3c4ae8f92db3cbe9c7bd0a53c30092b5168aa8687a13e95096bba828cffdb2a13592daafdb4ef8e30740e3d23df7b1c6e6b9f5234241aee156a8c73b2b7904a0059f53cbcdede1", 0x5f}, {&(0x7f00000006c0)="08ff87baa08dfca63248d349f04fe8af6087e3912ac1bc2e53b03525472f853b56ccc0264b6623c1c72e9c674b0dc3d4cac41cae52490ce595ca892d1afad7cf4f0d6633d44021449f3a1fa966ef54f956d1735973b101336086dda300fffe5a978e7430cd4838b7dfffc30812beb587a3a0650cdff87d05695e6765f48e9e185a3b435cd9f2a4c1bd073666b25709129f4f0d98fdf0cbfe0f0a3cf0f36e4bf7c8c3b5fc33e8bd745e20951a962f259e06ad18c6380f6a102c2c75387f38c3fd2bbf3999a608fe", 0xc7}, {&(0x7f00000005c0)="fee5d3aee10638544469812c9030557aa2c623c5b32e1b40b7eb5f7c20deba2bdf507f83feaac0d908d463d8ad3aa7b3ec09a37e13a8f10e139e00cbe26f59bbda0feec4c64522aeeabe754eaed8cab59b39f3c5c98a31664bd2bc71b7a99e6bffd5937977b2d5", 0x67}, {&(0x7f00000007c0)="694ae22c8dd30f2bc72c3e31e392dcad5c9ebd852f402fa8dc223c30fe52f4538d11b990d5171a093dc7fff819c94c7e20c1eef17186a975cd90edb3748a38547c03e0fe9dd3a5050bd3404f85c2edd9205454e76fbf1072402f63a26b2d1f8653acb980550e9867f0", 0x69}, {&(0x7f0000000880)="0d8c779a33a8a12f13fd407db35497aee71ed77e8aa2ceb01d1e82049a9013d9d22f40e9e2f9dea2a97edfd4fa38604c3d16ca68876ea6f9b682d099e6ae7c738bd8574145c9858a8a8071b20163fd74f204915879b9f8b89aba5b851216b34d5a41db180cbe8165c04d56a1b9f7fc9df4189e", 0x73}], 0x6, &(0x7f0000001640)=[{0x20, 0x1eb, 0x1ff, "5399dbb04ff3ab7670b5e333eefc"}, {0x1010, 0x6, 0x3, "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"}, {0xf0, 0x10e, 0xe1, "78f3c315197a0fb59debe873359ccba5596377b20696929f05975e7dd8c69e16575134716f3d2764696382561e1f2893df4190fc02d4ce0021ec136c4e12467fd2768252189bee7c6800c05d44d7b5fa7d6c1289f0c59660198bc4faa6dfd90b60ec0ca3490420b722534c9b71543edbf1a2cc2e607433ed5fec9f2019a91ab60c421b299c43f34bfeb3c971ef652a731bcfbb60a81ce16233d10fc704a7d26cf7e211aa4a3f79803e64488cfdf310fb871321613c9337ef499b3d7a54439a2b8b482bf548c06d6d14147334c471ec6d82ac1aeef2856f605d28e0811f"}, {0xd8, 0x3a, 0xffff, "cf6aec32c86476eb21d67e56b80a8fb1cf082a60a792756d7e1628e93aa5b2d6fb8be6d1d5dbad1be1e963c5e2ca1e898880fe516d4957c5bd305af4184d4abda6325f80e0673aa048519bfb8eadf006ea9c9511d43f73809e88f091e7c583d29209e670c15581caf64bd8333288e085e68a77b1afc632cb1b892545a6158a2930a7a87473ec69d841aed68a126602f5a96acfc393d949800c4de3f5c5b25d8fe6d454271433308a3788443090c546d52851c9871f49b24302baf14197cb71bdabf8df6f5b34"}, {0x80, 0x3a, 0x0, "340526dc9b2f747c655724410adeccc62f92632527d839cac197a7d4ff4dfedf995c4a7b3ef031d5602120c171120ad862ffd82d84015f901bb442031cbef5304638348473d0e9137e43d6113dcae1abfa8f07eba622282a4f3fec32b61a8cdd4a55dfbd8ab04957d534fecf"}, {0xb8, 0x102, 0x2, "d8ed2e8171470a290cb75c7fe226a3b282e3f94e759c8c8938a33ae4310536ac01279c01fdd7faea0ac3629fce758e0c655242e825cb6d59c0137c55209542ce90bcd8461a2187ad7f6e138a44bb0cb31d13b277cf66780089eeeb26b98a11094fb8c3c5d44aa35223676e9405a60c8aa1e01f0d2e46958595a03d19c71e558baab7d8f8e4fd82a69fbe486695e2495496e65c2a6b79dab21badab0ff6c9a8c990e8af52b611e02b"}, {0x20, 0x10a, 0xffffffff, "965b9e703c640a0c7719379e99"}, {0xb8, 0x117, 0x3, "4ba8bbe84142c048a6d40c7d4a6e8d724fb81e2445251b50169b6ae897bc5300a5eadefec9b7d88bd879a2cec6359227af7e963cbcd582677726803e69fc4741b2f65cd51bd36a04fd22083bed880044a4b6e9e035b052b01b5f953ccd4ed7f962e1bce09f0fbaaf5ff1d2471c6172ad4b6caa2d5dd31addc69cc2a90a2203c154e72e5fd54d2a8d0da8aeacc1a27db9020d115d2d5fa75713019a367d4798665389c3e5bcef"}, {0x28, 0x3a, 0x5, "d10d37446770e4e2a87bd151cd622114a52a1b12"}, {0x70, 0x84, 0x1, "1f15e3a976ae87f48f02178cbf569b0de29de535520ca81170d52e8681054304e2bead67f85badbc507ad329e03018288000eaafa871e6a10ba708206abee72f2a0a4fa415efed681f5b771a5071d56eb097501b7f4eb6a84a43284f662c80"}], 0x14a0}, 0x90) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') r3 = perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x17658e8c6eb377bb) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) 14:57:48 executing program 0: socketpair(0x11, 0x0, 0x0, &(0x7f0000000080)) [ 480.864720] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 12 14:57:49 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 14:57:49 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:57:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66", 0x39, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002180)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r0, 0xffffffffffffffff, 0x25}, 0x10) 14:57:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) 14:57:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000001c0)=""/193, 0x26, 0xc1, 0x1}, 0x20) 14:57:49 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, 0x0) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:57:49 executing program 0: bpf$MAP_LOOKUP_ELEM(0xc, &(0x7f0000000a00)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 14:57:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c70135424380"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:49 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, 0x0) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:57:49 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x894c, 0x0) 14:57:49 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f00000140c0)='ns/user\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000016cc0)={0x0, 0x5, &(0x7f0000016ac0)=@framed={{}, [@initr0]}, &(0x7f0000016b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000016c80), 0x10}, 0x78) [ 481.225130] 8021q: adding VLAN 0 to HW filter on device team0 14:57:49 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, 0x0) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) [ 481.287512] bond0: Enslaving team0 as an active interface with an up link [ 481.296961] bond0: Releasing backup interface team0 [ 481.311142] bridge0: port 3(team0) entered blocking state [ 481.333542] bridge0: port 3(team0) entered disabled state [ 481.345100] device team0 entered promiscuous mode [ 481.351206] device team_slave_0 entered promiscuous mode [ 481.358248] device team_slave_1 entered promiscuous mode [ 481.375988] device team0 left promiscuous mode [ 481.380688] device team_slave_0 left promiscuous mode [ 481.386068] device team_slave_1 left promiscuous mode [ 481.391774] bridge0: port 3(team0) entered disabled state [ 481.400626] 8021q: adding VLAN 0 to HW filter on device team0 [ 481.407766] bond0: Enslaving team0 as an active interface with an up link 14:57:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66", 0x39, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000001c0)=""/193, 0x26, 0xc1, 0x1}, 0x20) 14:57:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 14:57:49 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) getpid() r4 = getpid() kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:57:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c70135424380"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) [ 481.967971] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 481.967971] 14:57:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x4044054) 14:57:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c70135424380"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) [ 482.063382] bond0: Releasing backup interface team0 14:57:50 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) getpid() r4 = getpid() kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:57:50 executing program 3: bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) [ 482.087637] bridge0: port 3(team0) entered blocking state [ 482.105787] bridge0: port 3(team0) entered disabled state 14:57:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 14:57:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c701354243800000000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) [ 482.144974] device team0 entered promiscuous mode [ 482.181556] device team_slave_0 entered promiscuous mode [ 482.207703] device team_slave_1 entered promiscuous mode 14:57:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66", 0x39, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:51 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) getpid() r4 = getpid() kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:57:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c701354243800000000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000016cc0)={0x11, 0x3, &(0x7f0000016ac0)=@framed, &(0x7f0000016b00)='GPL\x00', 0x0, 0xcc, &(0x7f0000016b40)=""/204, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:57:51 executing program 3: socketpair(0x14, 0x0, 0x0, &(0x7f0000000180)) 14:57:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) [ 483.000535] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 483.000535] 14:57:51 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() getpid() kcmp$KCMP_EPOLL_TFD(r4, 0x0, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:57:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141440e0", 0x0, 0x9}, 0x28) 14:57:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c701354243800000000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:51 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() getpid() kcmp$KCMP_EPOLL_TFD(r4, 0x0, 0x7, r0, &(0x7f00000000c0)={r3, r2}) [ 483.113517] device team0 left promiscuous mode [ 483.133598] device team_slave_0 left promiscuous mode 14:57:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x27, 0x303, &(0x7f0000000040)="b90103600000f000009e0ff088f71fffffe10e000021633a77fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) 14:57:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) [ 483.180143] device team_slave_1 left promiscuous mode [ 483.222366] bridge0: port 3(team0) entered disabled state [ 483.265722] 8021q: adding VLAN 0 to HW filter on device team0 [ 483.310022] bond0: Enslaving team0 as an active interface with an up link [ 483.334441] bond0: Releasing backup interface team0 [ 483.347652] bridge0: port 3(team0) entered blocking state [ 483.353340] bridge0: port 3(team0) entered disabled state [ 483.360479] device team0 entered promiscuous mode [ 483.365352] device team_slave_0 entered promiscuous mode [ 483.371329] device team_slave_1 entered promiscuous mode 14:57:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000"/85, 0x55, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:52 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() getpid() kcmp$KCMP_EPOLL_TFD(r4, 0x0, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:57:52 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x31170000, &(0x7f0000000300)=[{&(0x7f0000000340)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a000f0000000280f0001201", 0x2e}], 0x1}, 0x0) 14:57:52 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0189436, 0x0) 14:57:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) [ 483.996776] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 483.996776] 14:57:52 executing program 1: epoll_create1(0x0) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000086fff4)) r3 = getpid() r4 = getpid() kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={r2, r1}) 14:57:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000200)=""/243, 0x26, 0xf3, 0x1}, 0x20) [ 484.110273] device team0 left promiscuous mode [ 484.131269] device team_slave_0 left promiscuous mode [ 484.142447] device team_slave_1 left promiscuous mode 14:57:52 executing program 1: epoll_create1(0x0) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000086fff4)) r3 = getpid() r4 = getpid() kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={r2, r1}) 14:57:52 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001540)) [ 484.175911] bridge0: port 3(team0) entered disabled state [ 484.206114] 8021q: adding VLAN 0 to HW filter on device team0 14:57:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) [ 484.226355] bond0: Enslaving team0 as an active interface with an up link [ 484.234904] bond0: macsec0 is up - this may be due to an out of date ifenslave [ 484.278026] bond0: Releasing backup interface team0 [ 484.297233] bridge0: port 3(team0) entered blocking state [ 484.318684] bridge0: port 3(team0) entered disabled state [ 484.330268] device team0 entered promiscuous mode [ 484.335238] device team_slave_0 entered promiscuous mode [ 484.342200] device team_slave_1 entered promiscuous mode [ 484.351824] bond0: macsec0 is up - this may be due to an out of date ifenslave 14:57:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000"/85, 0x55, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:53 executing program 1: epoll_create1(0x0) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000086fff4)) r3 = getpid() r4 = getpid() kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={r2, r1}) 14:57:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 14:57:53 executing program 0: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:57:53 executing program 4: syz_genetlink_get_family_id$gtp(&(0x7f0000001400)='gtp\x00', 0xffffffffffffffff) [ 485.026781] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 485.026781] 14:57:53 executing program 4: openat$dsp1(0xffffffffffffff9c, &(0x7f0000001000)='/dev/dsp1\x00', 0x84500, 0x0) 14:57:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, &(0x7f0000001100), 0x0, 0x0) 14:57:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000001580)={{}, {@val, @max='max'}}) 14:57:53 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, 0x0) 14:57:53 executing program 0: r0 = socket(0x18, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x18, 0x2}, 0xc) [ 485.285677] print_req_error: I/O error, dev loop5, sector 0 14:57:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000"/85, 0x55, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:54 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, 0x0) 14:57:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:54 executing program 0: r0 = socket(0x18, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x18, 0x2}, 0xc) 14:57:54 executing program 4: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000080)='./file2\x00', 0x0, 0x0) openat(r0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file0\x00', 0x200, 0x0) 14:57:54 executing program 3: r0 = socket(0x1, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 486.096586] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 486.096586] 14:57:54 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, 0x0) 14:57:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:54 executing program 0: r0 = socket(0x18, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x18, 0x2}, 0xc) 14:57:54 executing program 3: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') openat(r0, &(0x7f0000000500)='./file0\x00', 0xa12f529f75a693a6, 0x0) 14:57:54 executing program 4: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000080)='./file2\x00', 0x0, 0x0) openat(r0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file0\x00', 0x200, 0x0) 14:57:54 executing program 0: r0 = socket(0x18, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x18, 0x2}, 0xc) 14:57:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000"/99, 0x63, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:55 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={0xffffffffffffffff, r2}) 14:57:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:57:55 executing program 3: r0 = socket(0x18, 0x2, 0x0) sendto(r0, 0x0, 0x2, 0x0, &(0x7f0000000ac0)=@in={0x2, 0x3}, 0xc) 14:57:55 executing program 0: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000080)='./file2\x00', 0x0, 0x0) open$dir(&(0x7f0000000200)='./file1\x00', 0x200, 0x13d) openat(r0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file0\x00', 0x200, 0x0) 14:57:55 executing program 4: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000080)='./file2\x00', 0x0, 0x0) openat(r0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file0\x00', 0x200, 0x0) [ 487.028210] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 487.028210] 14:57:55 executing program 3: r0 = socket(0x18, 0x2, 0x0) recvfrom(r0, &(0x7f0000000100)=""/217, 0xd9, 0x0, 0x0, 0x0) 14:57:55 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={0xffffffffffffffff, r2}) 14:57:55 executing program 4: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000080)='./file2\x00', 0x0, 0x0) openat(r0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file0\x00', 0x200, 0x0) 14:57:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r0, 0x5406, 0x0) 14:57:55 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = getgid() lchown(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, r0) r1 = getuid() lchown(&(0x7f0000000000)='./file0\x00', r1, 0x0) 14:57:55 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={0xffffffffffffffff, r2}) 14:57:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000"/99, 0x63, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:56 executing program 0: r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000040)=@abs, 0x8) 14:57:56 executing program 4: getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, 0x0, &(0x7f0000000080)) madvise(&(0x7f000000b000/0x1000)=nil, 0x1000, 0x0) 14:57:56 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3}) [ 488.041467] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 488.041467] 14:57:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040), 0x47) 14:57:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r0, 0x5406, 0x0) 14:57:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, 0x0) 14:57:56 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3}) 14:57:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r0, 0x5406, 0x0) 14:57:56 executing program 3: r0 = socket(0x18, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@rights], 0x10}, 0x0) 14:57:56 executing program 0: readv(0xffffffffffffff9c, &(0x7f0000000380)=[{0x0, 0xffffffffffffff1f}], 0x21860a31bf35b8ce) 14:57:56 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3}) 14:57:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000"/99, 0x63, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:57 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) 14:57:57 executing program 3: r0 = socket(0x18, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000080)={0x3c4a}, 0x8) 14:57:57 executing program 1: r0 = socket(0x18, 0x2, 0x0) shutdown(r0, 0x2) 14:57:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) 14:57:57 executing program 0: open$dir(&(0x7f0000000180)='./file0\x00', 0x200, 0xfdfac9de24eb24ef) [ 489.018337] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 489.018337] 14:57:57 executing program 1: r0 = socket(0x1, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)=@in6={0x18}, 0xc) 14:57:57 executing program 4: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000080)='./file1\x00', 0x40) symlinkat(&(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) 14:57:57 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) readv(r0, &(0x7f0000000300)=[{0x0}], 0x1) 14:57:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@file={0x0, './file1\x00'}, 0xa, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x30}, 0x0) 14:57:57 executing program 2: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 14:57:57 executing program 0: mkdir(&(0x7f00000000c0)='./file2\x00', 0x0) 14:57:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f7030000000000000000000000000000000000000000000000000000000000000703334", 0x6a, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:58 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x9}, 0x0) 14:57:58 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) getdents(r0, 0x0, 0x0) 14:57:58 executing program 2: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000500)='./file0\x00', 0x20221, 0x0) 14:57:58 executing program 0: setitimer(0x0, &(0x7f0000000040)={{0x80000000}, {0x4ed}}, 0x0) 14:57:58 executing program 4: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000500)='./file0\x00', 0x20221, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)='./file1\x00', 0x0) [ 490.030143] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 490.030143] 14:57:58 executing program 1: accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) madvise(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0) 14:57:58 executing program 0: mkdir(&(0x7f0000000000)='./file2\x00', 0x0) symlinkat(&(0x7f00000000c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') link(&(0x7f0000000040)='./file2\x00', &(0x7f0000000080)='./file0\x00') 14:57:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) getdents(r0, 0x0, 0x0) 14:57:58 executing program 2: r0 = socket(0x2, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000040)) 14:57:58 executing program 4: shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x0) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 14:57:58 executing program 1: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xf64b3148fe370718, 0xffffffffffffffff, 0x0) 14:57:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f7030000000000000000000000000000000000000000000000000000000000000703334", 0x6a, 0x6000}], 0x0, &(0x7f0000013c00)) 14:57:59 executing program 0: madvise(&(0x7f0000000000/0x10000)=nil, 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 14:57:59 executing program 1: r0 = socket(0x18, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 14:57:59 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x8) 14:57:59 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 14:57:59 executing program 4: select(0x40, &(0x7f0000000000)={0x100000001}, 0x0, 0x0, 0x0) [ 491.071004] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 491.071004] 14:57:59 executing program 1: select(0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), &(0x7f0000000100)) 14:57:59 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0}, 0x38) 14:57:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000000c0)='l', 0x1) 14:57:59 executing program 2: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') openat(r0, &(0x7f0000000500)='./file0\x00', 0x200, 0x0) r2 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file2\x00', 0x0, 0x0) linkat(r2, &(0x7f0000000080)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) 14:57:59 executing program 4: mkdir(&(0x7f00000000c0)='./file2\x00', 0x0) r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000340)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') openat(r1, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) 14:57:59 executing program 0: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x1010, 0xffffffffffffffff, 0x0) 14:58:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f7030000000000000000000000000000000000000000000000000000000000000703334", 0x6a, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:00 executing program 3: r0 = socket(0x18, 0x2, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 14:58:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) select(0x40, &(0x7f00000000c0)={0x8}, 0x0, 0x0, 0x0) 14:58:00 executing program 2: r0 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000200)='./file1\x00', 0x200, 0x13d) openat(r0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) 14:58:00 executing program 0: clock_gettime(0xa00da901d47f21f1, 0x0) 14:58:00 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="00ec2d2f60696c653100"], 0xa, 0x0, 0xb7, &(0x7f0000000000)=[@rights, @cred], 0x30}, 0x0) 14:58:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r0, 0x0, 0x0, &(0x7f0000000300)="448f8a68ad182c8245fbd6dd46d392cc23784e3dcb7d702622e0f6916a1fd32605e9800d4d05e4f39292cab6aa83d5de724d328a8bf03dee6104a2175563da0f21284fdafe567c457e62583d796680b35cba1f4b70d751ab1354356057787cef3177c2b99cef215c6b7ea563c12d3682e802658de4e3e468ed4ed955f9705fb95ffbbcbbe8ac6ab8934bbdbe5c8d912dcfb4bfd81127c59e62455b5108555a8cd22cef73f8b6e76732ead30ba1c73cb5a88bbfba7ca86658c0ce53603450d0846f3217f414dcc691236ca5dd6de04161c9aaac889d700eb1f4d35d74ee4051a45a1aa6769aa9f3027fc9623dcb2b78a34c2438cbf8464ac2939f9873e1d4818666db0a685facde7675d18ad3303ae7d9a6ec336cb161580a556eb342aad97e64cb4d2ad3172bf4b96cebdc09892c2418acb6e03470a06ce85f7b4ce7c9bdbf44699e8882f077c35d1a210c54ab4bd67d89e9698be7487a4aaf20a6bc1c974500713f138b64d6ac79d1341c6d6602c1ce88a821c6af64e3fbd0e15bc62cfe24467ac4f45e97868c5280928fc08117254f81dfc498a0293c8d9fe48578a114554cf3f80388e14fcc6e85769a06521499eef8e786bb3e962521769bd0ae0153a372d276ed93d6b9960d787a0687ea4402849b6222c17b25805bd4f73d1cd603f2537d4515cbf668e9402d90bcaccdd7c907dc1c4c041d8d2bda27d98b4101b3d4495ddf417f4d9d1193a2b18e99721dc2e9e4f1a3e210075448c8c4450b0c21810cfc58122a0b6d8fd248b30d45ab1c8396def0c7f09457d69e52b8403dd646872b063705974841fc03b260800b0e6781352220afbede932d667123f196f8402a1a0c135117a413cbbf4685fdec8fae646978bf7cde09d5fcce5ac7c6868d3a28c6b708b66ecb9358768d9a98054902dd9794ac4f7f4fd475ee5622aae4245c274778d1b9c2ee1c6ebaf0f721fedf22c8b1061343736033fadfc2bbd7f27fcf04ca65baa023ab60f290a01bff91db37d58c743703d176bb22845c51d000f849fe627f581d0b6ee5dd13a691b69aaa6731c1073c1e27f3bb064c8588e1c50127649c33cc9044bb04f45dc5fbe52d083e697cd41c9abd27b4f5d262f611c3ea42a2311cfce5b7bfd79877b56ea2b3eb4e834bb7a9e1af9b1a1f84a5a528fb85fcc0ddb08467619987595668b4f60c694fe9d4503e02fdde930490a34ad461e090eee8112c880e6bbc09a237fbf622d1e019d106407f0279fc1d202df9c8a7c50e132fb6a3939309fd8e69ba36d04fb3b153d47d983c270e387bb7f1da8261c3094646351d2f40f712318f0f63765530fad9b030e25da00a68671eda96b33e96252239f01a9fa8490daccc13df283ef4409e8c73868150888f5bc272fbe22c90007e505168969a57030da216ec1251181d99804143f0be34aa737cf72c0a58af00b424ba0bc50076bf2a8bc2208f34d99a155c83ba87cfdae0266bf995a9e681acb03bf2c2af7077bec26d4d687dfb07edc63e933ebd60dc3f336d6ff28a78b6dea10090cd74d718845a4c146251f5d34f039dfafd8884efc4628130f4f6f8bf3d9847b491be509aef26a64232e3467fa279d2d9b40f9916c005d2677d06034353ed1629196b8b7008ce65d33b3e73c348a4f1207d9327eae09ce121fb74a6953bdd590c833085690b3b2e1871e690c9443e6966e4dc0dd32479a2b201f96f965a15e6c481f901b4d528ada3d88343ecfb8e9bf96df8a87d46db0693d965b5791c0756952af54ce3e005e85d0a012b2e6d9713fda0e8e56fccf264c5c1d037ad3f641251fb06dedba3646374192ae97a77b1bb38fd7e2633719eed469a120e03de657b1724dd322fcc70c687f927841e57392472f693262b99431ebf1d697545054f4696b1492b46ba53dafe258d35e0e79fa93daff467931ed0e0d4f627531c37eb37698b414389e422277c1521ff3629b96d634e4fe60490c1889c53f5cd8821d395cebf6ccf70af38ba400930f252c69ea5bf0bc806a58f8d740bfb37c46f8426557688df2dae443604951807ddf57f102d980f810e186d9cdf78ecd3c620b72d5096eef248caddc7b19ea923cb50af2c1c26448472fdd1f556a66b804951002a443e8c0102a60caf963d64291967ccf184eed25104845f98f6c3df6bc43575b3cc302ce1e0f8a15c02c73c17003187ef94f4ae9c104742c13ff92857c10e9db1a2d5d8a5c833e03db2cc6fd8074fa16ad802987465c18a8fe2c16926b7849da78a8d0891eb29393c5a0bd26f8192df86918a86707ed5b9374b06087e3c35940c5ab403af6b26beaa9301642a01ed32946ef1f05b1b24af4f1bbc25fca3ace764ac2f13bfc6a5c6fd0ef11a4ffdbb4f5f67d48c20490fa41ca8adcb82e7d0f4c72f7233e2e08b00dba1d65cf10a1373212152ff0ccef111c566f88b10c71a8ec6c4bf575f1cfe3f14de115c3252689a8a0704a5870908d0b02e2ea5ac661e3dc5563592cff57bcc37c991e5de4492f6f24bc2d2b4ebe342edd191b20abe554526fe081f57ba10c08db068a970350974de19b00d3ab50571440e03c1abad5b466db416edaf50e66fef64177d6c44bc9c38ab10cd80230f0fe7d18b3224512356f7ff02f8e55746c773ececc39554251bb0a42a75ee00b71c9d011bdb091dc1f7f1d78d90644b213a1cab6530f2f8b4e74f45573329e2ddc5abf12d13732ddf52aeab92ce238be89475d715e4aa1afae50bd7a2c33aeb60e8e5bd2c5b8f95030a96f5191eb86603627e1acd3b0062cf709d04de679a76ff5ce1b097feaf0e42feaa8aad934395b31338427c1a8b47f0d4fc2a130f3d64acc0c8b032072aba743c2f59c67074f8b8418bf0375f98ff2cbde28461fd987584084143c5c8a94ec8b84b68d3", 0x801) [ 492.110985] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 492.110985] 14:58:00 executing program 4: r0 = socket(0x18, 0x2, 0x0) shutdown(r0, 0x1) 14:58:00 executing program 3: socket$inet6(0x18, 0x103bd3f3454930d9, 0x0) 14:58:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 14:58:00 executing program 2: nanosleep(&(0x7f00000002c0)={0xffffffffffffffe0}, 0x0) 14:58:00 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@file={0x0, './file1\x00'}, 0xa, 0x0, 0x0, 0x0, 0x30}, 0x0) 14:58:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f", 0x6e, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:01 executing program 0: socket$inet(0x2, 0x854d42d44931ac6, 0x0) 14:58:01 executing program 2: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x80000001}, {0xe3}}, 0x0) 14:58:01 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001a80)=[{0x0}], 0x1000000000000121}, 0x0) 14:58:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x0, 0x8001}, 0x8) 14:58:01 executing program 1: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x80000001}, {0x0, 0x10000}}, 0x0) [ 493.070563] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 493.070563] 14:58:01 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)="3836304b3c7539995eb203092b46e304807bd32db24dc92de16eddecba9ad2f2f941728f3219d378bd3c6a714d14bea700005d8162e8d0e9f9e29eb2d5393880b36c8c7e38f51ca7b7f01a57136b31f055dd123620aaa861d062f8b459d13ab49f57aa1c7a7a6892a59f09368f7fbc46a57f34ee50322e5ba74edf481b06bc045a606f8effc1db4ad3e42944e16115a1df", 0x91}], 0x1000000000000251, 0x0, 0x1c, 0x403}, 0x8) 14:58:01 executing program 3: readv(0xffffffffffffff9c, &(0x7f00000001c0)=[{0x0, 0x16}, {&(0x7f0000000200)=""/190, 0xffffffffffffff81}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x3) 14:58:01 executing program 2: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 14:58:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, 0x0) 14:58:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x1, 0x1, 0x301}, 0x14}}, 0x0) 14:58:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 14:58:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x5) 14:58:02 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x402100, 0x0) 14:58:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc637}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 14:58:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f", 0x6e, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:02 executing program 4: r0 = socket(0xa, 0x1, 0x0) sendmsg$alg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4004040) [ 494.106862] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 494.106862] 14:58:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000002540)='nl80211\x00', 0xffffffffffffffff) 14:58:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0xb, 0x6, 0x401}, 0x14}}, 0x0) 14:58:02 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x151000, 0x0) 14:58:02 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) 14:58:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 14:58:02 executing program 2: sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) 14:58:02 executing program 3: accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 14:58:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000001b00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001ac0)={0x0}}, 0x4000840) openat$zero(0xffffffffffffff9c, &(0x7f0000002380)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000002540)='nl80211\x00', r0) 14:58:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000440)={0x18, 0x0, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}}, 0x0) 14:58:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000001400)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 14:58:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f", 0x6e, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:03 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x380, 0x0) 14:58:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={0x0}}, 0x0) 14:58:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/zero\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:58:03 executing program 2: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x9, 0x101400) 14:58:03 executing program 0: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) [ 495.066834] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 495.066834] 14:58:03 executing program 4: socket(0x10, 0x3, 0x40000) 14:58:03 executing program 2: syz_genetlink_get_family_id$team(&(0x7f00000021c0)='team\x00', 0xffffffffffffffff) 14:58:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f0000000440)={0x34, 0x0, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast2}}}]}, @CTA_EXPECT_ZONE={0x6}]}, 0x34}}, 0x0) 14:58:03 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000002380)='/dev/zero\x00', 0x0, 0x0) 14:58:03 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000002100)='/dev/zero\x00', 0x151000, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000021c0)='team\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000003640)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000003780)='nl80211\x00', 0xffffffffffffffff) 14:58:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f7465", 0x70, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001f00)={0x0, 0x0, 0x0}, 0x0) 14:58:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r0, 0x0, 0x0, &(0x7f0000000000)="9a69fb2324f54069027215e6b49ff16449a28ba3b77f823bcc56c3838867f208913a679f71b9c9e2511194830cf9c1d700d89a50c37b686fc1794af313e8a70cb3820bf04084494d67c3395cda17bdf654d4abae9524577fcef373905169c2ceff40930407390e1cc307352f28d5583e4ca4dc6895159afd5e289520b2751627ef22694f6e05888c0f4aca295ed8467d58458c538f99d54c79d510868243bdfeef19e4c1034af4cbc15a05eaede7238013d434ecc4f48bc2e44c6b37646d9d114c07077928a17349dd46839b217967db15ffdbcdbf2a425f59d94fefa262bb389b", 0xe1) 14:58:04 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 14:58:04 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000021c0)='team\x00', 0xffffffffffffffff) 14:58:04 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001ec0)={&(0x7f00000014c0)={0x14}, 0x14}}, 0x0) [ 496.034860] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 496.034860] 14:58:04 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f00000024c0)='/dev/zero\x00', 0x10202, 0x0) 14:58:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) 14:58:04 executing program 1: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) 14:58:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/protocols\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/protocols\x00') 14:58:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000600)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000500)=[@dstaddrv4={0x10}, @authinfo={0x10}, @authinfo={0x10}], 0x30}, 0x0) 14:58:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002300)={@ipv4={[], [], @remote}}) 14:58:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f7465", 0x70, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:05 executing program 0: r0 = fork() process_vm_writev(r0, &(0x7f0000000580)=[{&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000180)=""/150, 0x96}, {&(0x7f0000000240)=""/58, 0x3a}, {&(0x7f0000000380)=""/65, 0x41}], 0x4, &(0x7f0000000940)=[{&(0x7f0000000600)=""/158, 0x9e}, {&(0x7f00000006c0)=""/115, 0x73}, {&(0x7f0000000740)=""/194, 0xc2}, {0x0}], 0x4, 0x0) 14:58:05 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x8}, 0x0, &(0x7f00000000c0)={0x7}, 0x0, 0x0) 14:58:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, @hci, @nl=@unspec, @isdn}) 14:58:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xe, &(0x7f00000000c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:05 executing program 4: r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x64e, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x0) [ 497.044504] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 497.044504] 14:58:05 executing program 3: semget(0x0, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001500)=[{0x0}, {0x0, 0x0, 0x175800000}, {0x0}]) 14:58:05 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000013c0)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000003340)={0x2020}, 0x2020) 14:58:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) read(r0, &(0x7f0000000640)=""/67, 0x43) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000080)={0x0, 0x10000}, 0x10) readv(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/103, 0x67}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) recvfrom$inet(r1, 0x0, 0x350, 0x0, 0x0, 0x800e004dd) r3 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r3, &(0x7f0000000080)={0x10, 0x2}, 0x10) shutdown(r1, 0x0) 14:58:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 14:58:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000180)=""/96, &(0x7f0000000200)=0x60) 14:58:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x107382) r1 = memfd_create(&(0x7f0000000140)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x24002da8) 14:58:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f7465", 0x70, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:06 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x17, 0x0, 0x0) 14:58:06 executing program 0: semctl$SEM_STAT_ANY(0x0, 0x0, 0x12, 0x0) r0 = semget(0x0, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/117) syz_read_part_table(0x7fff, 0x8, &(0x7f0000001500)=[{&(0x7f0000000180)="3e242013825eb4cc8f22e6e1b45c", 0xe, 0x7f}, {&(0x7f00000001c0)="c426228d88b49e5dcaba3e57df0105fbee4d15302f1e0b3c13c4c102dde1f6775f3923426f5e49a03d604345e7d6b4c55c5dbd91148ee641ef3500318dc6a0214e57a5fbe0358904b6da1d6ddf44908e107bb5707d963b87829154f4c6a212f1ceba7dd2783c8620c13b3ce9ec055da29e1b84bbf639", 0x76, 0x7d}, {&(0x7f0000000280)="d347e924ff33cccc7f92403564dda38f4647b17754cae45406590f7ce5d8014849dd30c831fa9d106e1ab992ccb9f3b8", 0x30}, {&(0x7f0000000300)="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", 0xcf8, 0x175800000}, {0x0, 0x0, 0x101}, {0x0}, {&(0x7f0000001440)="827f2bedb8c818941be5506f69", 0xd, 0x80}, {0x0, 0x0, 0x36}]) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f0000000080)=""/247) 14:58:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fork() getgid() sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f00000000c0)="93", 0x1}, {&(0x7f0000000140)="98", 0x1}, {&(0x7f0000000240)='$', 0x1}], 0x3, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 14:58:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 498.103859] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 498.103859] 14:58:06 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000000)=[{0x2, 0x9e1, 0x1000}, {0x2, 0xffff}], 0x2) 14:58:06 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x17, 0x0, 0x0) 14:58:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x110) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x4c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() ioctl$KVM_RUN(r2, 0xae80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ptrace$setopts(0x4200, 0x0, 0x408000000000, 0x5) tkill(0x0, 0x34) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x2, 0x9, 0x5, 0x0, 0x6, 0x50802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000440), 0xa}, 0x400, 0x800000000004daf, 0x0, 0x4, 0x4000000800, 0x7, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x3) ptrace$setregs(0xf, 0x0, 0x9, &(0x7f0000000500)="d659b27642fdec31af63665f2a81c298e6d3a41e1addabe34ea0d682be7929a32f80e26e0ebb3c3adc1969fbf1eca540379bcd552f98846c091b499a93ee119125fb0fe688605bff730a7fcc881fbff0ee00740b2467769afa9981167f7890fbcfc8221a135dfe6b71dae3303e08ae15eeaf866d3bc2b1d8de972c337cd75172b8854de1c5b54c8e20d11af08817d25b87dad973b5d3c8073931db8a9b8700a286") r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r3) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:58:06 executing program 0: bpf$MAP_CREATE(0x7, 0xfffffffffffffffe, 0x0) 14:58:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x14, 0x9, 0x6, 0x101}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000240)={0x1f}, 0x0, &(0x7f00000002c0)={0x77359400}, 0x0) 14:58:06 executing program 2: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/244) 14:58:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x6, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 14:58:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71}], 0x0, &(0x7f0000013c00)) 14:58:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x7}]}, 0x1c}}, 0x0) 14:58:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f00000004c0)=""/168, &(0x7f0000000580)=0xa8) 14:58:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4339, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:58:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x110) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x4c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() ioctl$KVM_RUN(r2, 0xae80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ptrace$setopts(0x4200, 0x0, 0x408000000000, 0x5) tkill(0x0, 0x34) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x2, 0x9, 0x5, 0x0, 0x6, 0x50802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000440), 0xa}, 0x400, 0x800000000004daf, 0x0, 0x4, 0x4000000800, 0x7, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x3) ptrace$setregs(0xf, 0x0, 0x9, &(0x7f0000000500)="d659b27642fdec31af63665f2a81c298e6d3a41e1addabe34ea0d682be7929a32f80e26e0ebb3c3adc1969fbf1eca540379bcd552f98846c091b499a93ee119125fb0fe688605bff730a7fcc881fbff0ee00740b2467769afa9981167f7890fbcfc8221a135dfe6b71dae3303e08ae15eeaf866d3bc2b1d8de972c337cd75172b8854de1c5b54c8e20d11af08817d25b87dad973b5d3c8073931db8a9b8700a286") r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r3) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:58:07 executing program 4: bpf$MAP_CREATE(0xa, 0xfffffffffffffffe, 0x0) [ 499.141101] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 499.141101] 14:58:07 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd80, 0x0, 0x0) 14:58:07 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xe}, {0x10}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 14:58:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)={0x7fffefe0}, 0x10}, {&(0x7f0000000080)={0x10}, 0x10}, {&(0x7f00000000c0)={0x10}, 0x10}], 0x3}, 0x0) 14:58:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x5}]}, 0x1c}}, 0x0) 14:58:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x4}, 0x4) 14:58:07 executing program 2: r0 = fork() r1 = fork() rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f00000060c0)={0x0, 0x0, 0xfffffffe}) [ 499.435084] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 12 14:58:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71}], 0x0, &(0x7f0000013c00)) 14:58:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, 0x5, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 14:58:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x100000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x81, 0x9, 0x1, 0x8, 0x0, 0x1000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x800, 0x1, 0x7, 0x6, 0x8, 0x4, 0x20}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) dup2(0xffffffffffffffff, r3) r4 = socket(0x400000000000010, 0x2, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r4, 0xc0389423, &(0x7f00000001c0)={0x0, 0x10, [0x6, 0x0, 0x200, 0x2000], &(0x7f0000000140)=[0x0, 0x0]}) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x350, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, &(0x7f0000000180), {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x2, 0x0, 0x0, 0x3, 0x5, 0x4], 0x2, 0x2}, {0x1, [0x8, 0x1, 0x1, 0x0, 0x2, 0x2], 0x2}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1a}, @rand_addr=0x64010102, 0xffffffff, 0x0, 'syz_tun\x00', 'netpci0\x00', {0xff}, {}, 0x1d, 0x1, 0x78}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@icmp={{0x28, 'icmp\x00'}, {0xb, "ad2a", 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x3, 0x6, 0x6, 0x1, 0x0, 0x3], 0x3, 0x2}, {0x1, [0x5, 0x4, 0x4, 0xa, 0x1, 0x4], 0x6, 0x4}}}}, {{@ip={@multicast2, @loopback, 0xffffffff, 0xff, 'virt_wifi0\x00', 'dummy0\x00', {0xff}, {0xff}, 0xc, 0x0, 0x10}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0x8, 0x10, [0xc, 0x1f, 0x2d, 0x31, 0x5, 0x37, 0x1b, 0x1b, 0x3d, 0x38, 0xf, 0xa, 0xa, 0x9, 0x34, 0x18], 0x1, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r0) 14:58:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000440)={0x14, 0x0, 0x9, 0x801, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 14:58:07 executing program 1: bpf$MAP_CREATE(0x19, 0xfffffffffffffffe, 0x0) 14:58:07 executing program 2: bpf$MAP_CREATE(0x18, 0xfffffffffffffffe, 0x0) 14:58:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x28, 0x6, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 14:58:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000000109"], 0x64}}, 0x0) 14:58:07 executing program 0: bpf$MAP_CREATE(0x1a, 0xfffffffffffffffe, 0x0) 14:58:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000e40)={'team0\x00'}) 14:58:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)={0x10}, 0x10}, {&(0x7f0000000080)={0x10}, 0x10}, {&(0x7f0000000000)=ANY=[@ANYBLOB="00010000d27f42e9f9b018880a2773384f09413b40a000000000000000"], 0x10}], 0x3a}, 0x0) [ 499.686412] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 12 14:58:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) accept$unix(r0, 0x0, 0x0) 14:58:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71}], 0x0, &(0x7f0000013c00)) 14:58:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x5, 0x6, 0x201}, 0x14}}, 0x0) [ 499.739593] IPVS: ftp: loaded support on port[0] = 21 [ 499.902398] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 12 14:58:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x100000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x81, 0x9, 0x1, 0x8, 0x0, 0x1000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x800, 0x1, 0x7, 0x6, 0x8, 0x4, 0x20}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) dup2(0xffffffffffffffff, r3) r4 = socket(0x400000000000010, 0x2, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r4, 0xc0389423, &(0x7f00000001c0)={0x0, 0x10, [0x6, 0x0, 0x200, 0x2000], &(0x7f0000000140)=[0x0, 0x0]}) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x350, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, &(0x7f0000000180), {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x2, 0x0, 0x0, 0x3, 0x5, 0x4], 0x2, 0x2}, {0x1, [0x8, 0x1, 0x1, 0x0, 0x2, 0x2], 0x2}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1a}, @rand_addr=0x64010102, 0xffffffff, 0x0, 'syz_tun\x00', 'netpci0\x00', {0xff}, {}, 0x1d, 0x1, 0x78}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@icmp={{0x28, 'icmp\x00'}, {0xb, "ad2a", 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x3, 0x6, 0x6, 0x1, 0x0, 0x3], 0x3, 0x2}, {0x1, [0x5, 0x4, 0x4, 0xa, 0x1, 0x4], 0x6, 0x4}}}}, {{@ip={@multicast2, @loopback, 0xffffffff, 0xff, 'virt_wifi0\x00', 'dummy0\x00', {0xff}, {0xff}, 0xc, 0x0, 0x10}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0x8, 0x10, [0xc, 0x1f, 0x2d, 0x31, 0x5, 0x37, 0x1b, 0x1b, 0x3d, 0x38, 0xf, 0xa, 0xa, 0x9, 0x34, 0x18], 0x1, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r0) 14:58:08 executing program 0: bpf$MAP_CREATE(0x22, 0xfffffffffffffffe, 0x0) 14:58:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x0, 0x110) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x4c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() ioctl$KVM_RUN(r2, 0xae80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x4) ptrace$setopts(0xffffffffffffffff, 0x0, 0x408000000000, 0x5) tkill(0x0, 0x34) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x2, 0x9, 0x5, 0x0, 0x6, 0x50802, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000440), 0xa}, 0x400, 0x800000000004daf, 0x8000000, 0x0, 0x4000000800, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x3) ptrace$setregs(0xf, 0x0, 0x9, &(0x7f0000000500)="d659b27642fdec31af63665f2a81c298e6d3a41e1addabe34ea0d682be7929a32f80e26e0ebb3c3adc1969fbf1eca540379bcd552f98846c091b499a93ee119125fb0fe688605bff730a7fcc881fbff0ee00740b2467") r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r3) dup3(0xffffffffffffffff, r2, 0x0) 14:58:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x3}]}, 0x24}}, 0x0) 14:58:08 executing program 1: bpf$MAP_CREATE(0x6, 0xfffffffffffffffe, 0x0) 14:58:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:08 executing program 0: bpf$MAP_CREATE(0xd, 0xfffffffffffffffe, 0x0) 14:58:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0xb, &(0x7f00000004c0)=""/168, &(0x7f0000000580)=0xa8) 14:58:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc) [ 500.153920] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 500.181984] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 500.201840] EXT4-fs (loop5): group descriptors corrupted! 14:58:08 executing program 0: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x2700) 14:58:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[], 0x64}}, 0x0) [ 500.365301] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 500.394197] EXT4-fs (loop5): group descriptors corrupted! 14:58:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x100000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x81, 0x9, 0x1, 0x8, 0x0, 0x1000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x800, 0x1, 0x7, 0x6, 0x8, 0x4, 0x20}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) dup2(0xffffffffffffffff, r3) r4 = socket(0x400000000000010, 0x2, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r4, 0xc0389423, &(0x7f00000001c0)={0x0, 0x10, [0x6, 0x0, 0x200, 0x2000], &(0x7f0000000140)=[0x0, 0x0]}) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x350, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, &(0x7f0000000180), {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x2, 0x0, 0x0, 0x3, 0x5, 0x4], 0x2, 0x2}, {0x1, [0x8, 0x1, 0x1, 0x0, 0x2, 0x2], 0x2}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1a}, @rand_addr=0x64010102, 0xffffffff, 0x0, 'syz_tun\x00', 'netpci0\x00', {0xff}, {}, 0x1d, 0x1, 0x78}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@icmp={{0x28, 'icmp\x00'}, {0xb, "ad2a", 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x3, 0x6, 0x6, 0x1, 0x0, 0x3], 0x3, 0x2}, {0x1, [0x5, 0x4, 0x4, 0xa, 0x1, 0x4], 0x6, 0x4}}}}, {{@ip={@multicast2, @loopback, 0xffffffff, 0xff, 'virt_wifi0\x00', 'dummy0\x00', {0xff}, {0xff}, 0xc, 0x0, 0x10}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0x8, 0x10, [0xc, 0x1f, 0x2d, 0x31, 0x5, 0x37, 0x1b, 0x1b, 0x3d, 0x38, 0xf, 0xa, 0xa, 0x9, 0x34, 0x18], 0x1, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r0) 14:58:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000580)) 14:58:09 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x16, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x3, 0x248, 0x64000000, 0x4, 0xd0e0011, 0x0, 0xc6, 0x1d8, 0x1d8, 0x190, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1=0xe000f800, @multicast1, 0x0, 0x0, 'veth0_macvtap\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x3}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) 14:58:09 executing program 1: bpf$MAP_CREATE(0x0, 0xfffffffffffffffe, 0x0) 14:58:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) 14:58:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 500.967701] IPVS: ftp: loaded support on port[0] = 21 14:58:09 executing program 1: prctl$PR_CAP_AMBIENT(0x17, 0x2700, 0x0) 14:58:09 executing program 3: bpf$MAP_CREATE(0x4, 0xfffffffffffffffe, 0x0) 14:58:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 14:58:09 executing program 0: r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) 14:58:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x7, 0x1, 0x3}, 0x14}}, 0x0) [ 501.112244] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 501.146426] EXT4-fs (loop5): group descriptors corrupted! 14:58:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 501.319586] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 501.336353] EXT4-fs (loop5): group descriptors corrupted! 14:58:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x100000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x81, 0x9, 0x1, 0x8, 0x0, 0x1000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x800, 0x1, 0x7, 0x6, 0x8, 0x4, 0x20}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) dup2(0xffffffffffffffff, r3) r4 = socket(0x400000000000010, 0x2, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r4, 0xc0389423, &(0x7f00000001c0)={0x0, 0x10, [0x6, 0x0, 0x200, 0x2000], &(0x7f0000000140)=[0x0, 0x0]}) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x350, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, &(0x7f0000000180), {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x2, 0x0, 0x0, 0x3, 0x5, 0x4], 0x2, 0x2}, {0x1, [0x8, 0x1, 0x1, 0x0, 0x2, 0x2], 0x2}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1a}, @rand_addr=0x64010102, 0xffffffff, 0x0, 'syz_tun\x00', 'netpci0\x00', {0xff}, {}, 0x1d, 0x1, 0x78}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@icmp={{0x28, 'icmp\x00'}, {0xb, "ad2a", 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x3, 0x6, 0x6, 0x1, 0x0, 0x3], 0x3, 0x2}, {0x1, [0x5, 0x4, 0x4, 0xa, 0x1, 0x4], 0x6, 0x4}}}}, {{@ip={@multicast2, @loopback, 0xffffffff, 0xff, 'virt_wifi0\x00', 'dummy0\x00', {0xff}, {0xff}, 0xc, 0x0, 0x10}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0x8, 0x10, [0xc, 0x1f, 0x2d, 0x31, 0x5, 0x37, 0x1b, 0x1b, 0x3d, 0x38, 0xf, 0xa, 0xa, 0x9, 0x34, 0x18], 0x1, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r0) 14:58:09 executing program 2: bpf$MAP_CREATE(0x5, 0xfffffffffffffffe, 0x0) 14:58:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x10001, 0x2, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x0, 0x110) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x4c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x0, 0x0, @ioapic={0x0, 0x7fff, 0xadd4, 0x1, 0x0, [{0xff, 0x0, 0x3f, [], 0x3}, {0x2, 0x0, 0x80, [], 0xa4}, {0x0, 0x3f, 0x5, [], 0x4}, {0x0, 0x8b, 0x0, [], 0x81}, {0x7f, 0x1, 0x7, [], 0x81}, {0x1, 0x7, 0x0, [], 0x9}, {0x0, 0xfd, 0xae, [], 0x5}, {0x40, 0x1f}, {0x6, 0x0, 0x8, [], 0x6}, {0x2, 0x80, 0xe0, [], 0x7}, {0x7, 0x5, 0x5}, {0xed, 0x20, 0x7, [], 0x10}, {0x7f, 0x2, 0xfe, [], 0x1}, {0x0, 0x0, 0x2, [], 0xd9}, {0x40, 0x1, 0x3, [], 0x8}, {0xf0, 0xfc, 0x80, [], 0x2}, {0x1f, 0x8, 0x97, [], 0x1}, {0x5, 0x46, 0x7, [], 0x1}, {0x0, 0x0, 0x40, [], 0x4}, {0x3, 0x0, 0x3f, [], 0x81}, {0x1, 0x3, 0xcd, [], 0x1}, {0x0, 0x7, 0x66}, {0x6, 0x7, 0x3f, [], 0x5}, {0x0, 0x80, 0x0, [], 0x4}]}}) gettid() syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) ptrace$setopts(0x4200, 0x0, 0x408000000000, 0x5) tkill(0x0, 0x34) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x1, 0x2, 0x9, 0x5, 0x0, 0x100000001, 0x11802, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000440), 0xa}, 0x400, 0x0, 0x1, 0x6, 0x800, 0x4, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x10) ptrace$setregs(0xf, 0x0, 0x9, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r4) dup3(0xffffffffffffffff, r2, 0x0) 14:58:09 executing program 1: bpf$MAP_CREATE(0x11, 0xfffffffffffffffe, 0x0) 14:58:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x7, 0x0, 0x0, 0x0, 0x250, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x40) 14:58:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:10 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl(r0, 0x100, &(0x7f0000000280)="036a19") r1 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)='-', 0x1) dup3(0xffffffffffffffff, r1, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x3, 0x270, 0x64000000, 0x4, 0xd0e0011, 0x0, 0xc6, 0x1d8, 0x1d8, 0x190, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1=0xe000f800, @multicast1, 0x0, 0x0, 'veth0_macvtap\x00', '\x00', {}, {}, 0x1}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x3}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x31f) 14:58:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x7}, 0x40) 14:58:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 14:58:10 executing program 1: bpf$MAP_CREATE(0x10, 0xfffffffffffffffe, 0x0) 14:58:10 executing program 2: bpf$MAP_CREATE(0x15, 0xfffffffffffffffe, 0x0) [ 502.133784] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:58:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000240)={0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 502.202476] EXT4-fs (loop5): group descriptors corrupted! [ 502.211790] IPVS: ftp: loaded support on port[0] = 21 [ 502.237991] xt_connlimit: cannot load conntrack support for address family 2 14:58:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=[@cred={{0x1c}}], 0x20}, 0x0) 14:58:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x10001, 0x2, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x0, 0x110) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x4c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x0, 0x0, @ioapic={0x0, 0x7fff, 0xadd4, 0x1, 0x0, [{0xff, 0x0, 0x3f, [], 0x3}, {0x2, 0x0, 0x80, [], 0xa4}, {0x0, 0x3f, 0x5, [], 0x4}, {0x0, 0x8b, 0x0, [], 0x81}, {0x7f, 0x1, 0x7, [], 0x81}, {0x1, 0x7, 0x0, [], 0x9}, {0x0, 0xfd, 0xae, [], 0x5}, {0x40, 0x1f}, {0x6, 0x0, 0x8, [], 0x6}, {0x2, 0x80, 0xe0, [], 0x7}, {0x7, 0x5, 0x5}, {0xed, 0x20, 0x7, [], 0x10}, {0x7f, 0x2, 0xfe, [], 0x1}, {0x0, 0x0, 0x2, [], 0xd9}, {0x40, 0x1, 0x3, [], 0x8}, {0xf0, 0xfc, 0x80, [], 0x2}, {0x1f, 0x8, 0x97, [], 0x1}, {0x5, 0x46, 0x7, [], 0x1}, {0x0, 0x0, 0x40, [], 0x4}, {0x3, 0x0, 0x3f, [], 0x81}, {0x1, 0x3, 0xcd, [], 0x1}, {0x0, 0x7, 0x66}, {0x6, 0x7, 0x3f, [], 0x5}, {0x0, 0x80, 0x0, [], 0x4}]}}) gettid() syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) ptrace$setopts(0x4200, 0x0, 0x408000000000, 0x5) tkill(0x0, 0x34) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x1, 0x2, 0x9, 0x5, 0x0, 0x100000001, 0x11802, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000440), 0xa}, 0x400, 0x0, 0x1, 0x6, 0x800, 0x4, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x10) ptrace$setregs(0xf, 0x0, 0x9, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r4) dup3(0xffffffffffffffff, r2, 0x0) 14:58:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fork() sendmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000140)="98", 0x1}, {&(0x7f0000000240)='$', 0x1}], 0x3, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 14:58:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{0x0, 0x0, 0x85f8}], 0x0, &(0x7f0000000440)={[{@nodots='nodots'}, {@fat=@codepage={'codepage', 0x3d, '852'}}, {@nodots='nodots'}, {@fat=@nfs='nfs'}, {@dots='dots'}], [{@dont_hash='dont_hash'}, {@obj_user={'obj_user', 0x3d, '!/:g}-}^#'}}]}) 14:58:10 executing program 0: bpf$MAP_CREATE(0xe, 0xfffffffffffffffe, 0x0) 14:58:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 14:58:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 14:58:10 executing program 0: bpf$MAP_CREATE(0xf, 0xfffffffffffffffe, 0x0) 14:58:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x2000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 502.541613] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:58:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x2, 0x3, 0x301, 0x0, 0x0, {}, [@NFQA_CFG_MASK={0x8}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_FLAGS={0x8}]}, 0x2c}}, 0x0) [ 502.600452] EXT4-fs (loop5): group descriptors corrupted! 14:58:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f00000004c0)=""/168, &(0x7f0000000580)=0xa8) 14:58:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:10 executing program 4: mq_unlink(&(0x7f0000000000)='(/\x00') 14:58:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fdd000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000000)="0f01dfb9a2020000b84bc30000ba000000000f300f01d1f20f017f09b8ba0000000f23c80f21f835040070000f23f8aa66baf80cb8fe1dc084ef66bafc0cb01feeb9f80200000f3266bad00466ed0f01bed21488a0", 0x55}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fd8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc) 14:58:10 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4d2d81, 0x0) 14:58:10 executing program 4: eventfd2(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000580), 0x4) 14:58:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x18, 0x0, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 14:58:10 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000280)={@remote, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "f32807", 0x0, 0x2f, 0x0, @private2, @empty}}}}, 0x0) [ 502.831407] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:58:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00'}) 14:58:10 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r0, 0x0, 0xffffffffffffffcc, 0x0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x12022, &(0x7f0000001f80)={0xa, 0x0, 0x0, @local}, 0x544000) 14:58:10 executing program 2: fork() r0 = fork() wait4(r0, 0x0, 0x1, &(0x7f00000034c0)) 14:58:10 executing program 3: bpf$MAP_CREATE(0x17, 0xfffffffffffffffe, 0x0) [ 502.953866] EXT4-fs (loop5): group descriptors corrupted! 14:58:11 executing program 1: bpf$MAP_CREATE(0xb, 0xfffffffffffffffe, 0x0) 14:58:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe2c, &(0x7f00000003c0)={&(0x7f0000000200)=@ipv4_newrule={0x1c, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}}, 0x0) 14:58:11 executing program 3: unshare(0x20000000) 14:58:11 executing program 1: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@local, @empty, @val={@void}, {@ipv4={0x800, @igmp={{0x15, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote, {[@timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x0, [{@empty}, {@remote}]}, @timestamp_prespec={0x44, 0x2c, 0x0, 0x3, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@loopback}, {@remote}, {@multicast1}, {@broadcast}]}]}}, {0x0, 0x0, 0x0, @local}}}}}, 0x0) 14:58:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=@ipv6_getnetconf={0x14, 0x52, 0x1}, 0x14}}, 0x0) 14:58:11 executing program 4: syz_emit_ethernet(0x11, &(0x7f0000000180)={@multicast, @multicast, @void, {@mpls_uc={0x4305, {[], @llc={@llc={0x0, 0x0, 'G'}}}}}}, 0x0) 14:58:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_delrule={0x1c, 0x21, 0x1}, 0x1c}}, 0x0) 14:58:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv4_newrule={0x1c, 0x20, 0x609}, 0x1c}}, 0x0) [ 503.207394] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:58:11 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@val, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "3df41e", 0x1d1, 0x3a, 0x0, @mcast1, @private1, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "0fad81", 0x0, 0x0, 0x0, @private2, @mcast2, [@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@private2, @private1, @private2, @empty]}, @srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@private2, @dev, @empty]}, @srh={0x0, 0x4, 0x4, 0x2, 0x0, 0x0, 0x0, [@loopback, @loopback]}], "0cdb8037f790a8ca5d5f46fc7ab2a79bb082057d8752e1c970e2a92bd14539e4786e2770e04e1bb617c028540d3ce75e4ed246245fdb7facf9426c9138eb9b1f6ae06ca2ffc5a766df7b17767d37fd6bf0ceeb2c76b866262c3d5c3744a596202e4163e5f50dccb07e04b307c56071c887d4ace5425ee7e29bf1fcdbff180be471ac0999caca300448e7fa8b334c5746f8ed0e595cf734a7f07eb5d760dbbeb9a6ef53eafe0c8a1f900bbb105a3239b0771ebfb4d573518f2a486c41f73c0acdb03c186fee25f3411a4205fd093c0c8b09ddb3690e44f9a4a7cc1334ee0f3a65ace48953dbdd6b13cd64e8841d149dedc7b0feef76594d5014"}}}}}}, 0x207) 14:58:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000300)="ed41000000080000d2f479e40ce1985a655fd2f4655fd2f4655f00000000000002000400000000000800030000000af30100040000000000000000000000010000002000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000ffffffe30000ed8100001a040000d2f4655fd2f4655fd2f4655f01000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e0501000000b2177cc6517920372066d32bf9290000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f3a92c7a8267989ff0000000000000000010000002f746d702f73797a2d696d61676567656e38333031384ee032382f66692c65302f66696c653000000000000000000000000000000000000000000000790726b3000100000000000000000000000000000000000000d2f4655fd2f4655fd2f4655f00000000000001005600000000000800010000000af301000400000000000000ff0000889c11e4a900010000002500000000000000000000000000000000000000005d4b7afa1a6474110000000000000000000000a32dcc02210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f0000000000000200140000000000b0358f250800010000000af301000400000000000000000000000500000026000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed84c2d8a224ff3ec8838b6127cc85349a3476c204a17672a933231007d448d062e8b6d5d52e75f264", 0x2a3, 0x11580}], 0x0, &(0x7f0000000080)) 14:58:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) pipe2(&(0x7f00000001c0), 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000840)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475ffa1d000000000000ad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba387ec543ef51ffc665e7e849dba9091144b720231bde5d208ac7da30f7756dd3b8dcd15139d8e4ea5f7ef5b598fab081e6e9aa96f51211188bfcca813971a6922e6aada7f8ec46e6724db0becd59aef8953254f262cbed2ff76cce743646d0486aa92ad185b6fc950c1f653d54c2a92", 0x12c, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower='shortname=lower'}]}) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x8000) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) getpid() r1 = socket$unix(0x1, 0x2, 0x0) mkdirat(r0, &(0x7f0000000440)='./file0\x00', 0x4a) mkdirat(0xffffffffffffffff, &(0x7f0000000540)='./file1\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x10004050) socketpair(0x23, 0xa, 0x4, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f00000004c0)={0x0, @l2={0x1f, 0x2, @any, 0x20}, @ipx={0x4, 0x2, 0xff, "2f2b6a33c79f"}, @isdn={0x22, 0x1, 0x1, 0x0, 0x6}, 0xc00, 0x0, 0x0, 0x0, 0xf3, 0x0, 0x7, 0x10001}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580)='nl80211\x00', 0xffffffffffffffff) 14:58:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0x40) [ 503.294959] EXT4-fs (loop5): group descriptors corrupted! 14:58:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005ac0)={0x0, 0x0, &(0x7f0000005a80)={&(0x7f0000000580)=@deltfilter={0x24, 0x2d, 0xf, 0x0, 0x0, {0x18}}, 0x24}}, 0x0) 14:58:11 executing program 0: unshare(0x60400) syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00', 0xffffffffffffffff) 14:58:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000a80)={'tunl0\x00', 0x0}) 14:58:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000300)="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", 0x2a3, 0x11580}], 0x0, &(0x7f0000000080)) 14:58:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SPORT_RANGE={0x8, 0x18, {0x4e22, 0xf0}}]}, 0x24}}, 0x0) 14:58:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_FLOW={0x2}]}, 0x24}}, 0x0) 14:58:11 executing program 2: syz_emit_ethernet(0x32, &(0x7f00000001c0)={@local, @empty, @val={@void}, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote, {[@timestamp_prespec={0x44, 0x4}]}}, {0x0, 0x0, 0x0, @local}}}}}, 0x0) [ 503.437714] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 503.437727] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:793: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 503.450532] EXT4-fs error (device loop4): ext4_orphan_get:1242: inode #17: comm syz-executor.4: iget: bogus i_mode (37377) [ 503.459671] EXT4-fs error (device loop4): ext4_orphan_get:1245: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 503.459950] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 503.538421] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 503.538429] EXT4-fs (loop5): group descriptors corrupted! [ 503.648531] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 503.701460] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 503.701475] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:793: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 503.707215] EXT4-fs error (device loop4): ext4_orphan_get:1242: inode #17: comm syz-executor.4: iget: bogus i_mode (37377) [ 503.707462] EXT4-fs error (device loop4): ext4_orphan_get:1245: comm syz-executor.4: couldn't read orphan inode 17 (err -117) 14:58:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x64}]}) 14:58:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f00", 0x10, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {0x0, 0xffffffffffffffff}}]}, 0x28}}, 0x0) 14:58:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x3, 0x4, 0x9}]}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, 0x0, 0x4) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00'}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x80) 14:58:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c00000020000100000000000000000002000000000000000010000008000600040008"], 0x2c}}, 0x0) 14:58:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000300)="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", 0x2a3, 0x11580}], 0x0, &(0x7f0000000080)) [ 503.707860] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 14:58:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) 14:58:11 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000003c0)={[{@fat=@debug='debug'}]}) 14:58:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x4}, 0x40) [ 503.913021] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 503.932848] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 503.932848] 14:58:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@setneightbl={0x1c, 0x43, 0x1, 0x0, 0x0, {}, [@NDTA_NAME={0x7, 0x1, '[}\x00'}]}, 0x1c}}, 0x0) 14:58:12 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000001a80), 0x1008008, &(0x7f0000001b40)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '-'}}]}) [ 504.000514] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 504.019546] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:793: updating to rev 1 because of new feature flag, running e2fsck is recommended 14:58:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x18, 0x1}, 0x40) 14:58:12 executing program 3: socketpair(0xa, 0x3, 0x4, &(0x7f0000000080)) [ 504.070342] audit: type=1326 audit(1618844292.033:61): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28586 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 [ 504.106449] EXT4-fs error (device loop4): ext4_orphan_get:1242: inode #17: comm syz-executor.4: iget: bogus i_mode (37377) [ 504.149735] EXT4-fs error (device loop4): ext4_orphan_get:1245: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 504.183090] audit: type=1326 audit(1618844292.033:62): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28576 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 [ 504.215746] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 14:58:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:12 executing program 2: unshare(0x28000000) 14:58:12 executing program 0: socketpair(0xa, 0x3, 0x3a, &(0x7f0000000080)) 14:58:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getaddr={0x18, 0x16, 0x66472b5243ab9e8d}, 0x18}}, 0x0) 14:58:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000001480)={'gre0\x00', @ifru_hwaddr=@random}) 14:58:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000300)="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", 0x2a3, 0x11580}], 0x0, &(0x7f0000000080)) 14:58:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 504.740953] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 504.740953] 14:58:12 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001a80)=[{&(0x7f0000000780)="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", 0x1000}], 0x0, 0x0) 14:58:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8994, &(0x7f00000000c0)={'macvtap0\x00', @ifru_map}) 14:58:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001100)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x28}}, 0x0) 14:58:12 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000000)={@link_local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 14:58:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000006800010029bd7000fbdbdf25021f00fe", @ANYRES32=0x0, @ANYBLOB='\b\x00\b'], 0x6c}}, 0x0) [ 504.874831] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 504.901605] EXT4-fs (loop5): group descriptors corrupted! 14:58:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 504.918316] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 14:58:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv4_newrule={0x2c, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_PROTOCOL={0x5}, @FRA_GENERIC_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e22, 0x4e21}}]}, 0x2c}}, 0x0) 14:58:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x0, 0x80, 0x1}, 0x40) 14:58:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f00000002c0)={0x0, @in={0x2, 0x0, @dev}, @nfc, @l2={0x1f, 0x0, @fixed}, 0xfd, 0x0, 0x0, 0x0, 0xfd}) [ 504.955922] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:793: updating to rev 1 because of new feature flag, running e2fsck is recommended 14:58:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@ipv4_newnexthop={0x1c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) [ 505.002233] EXT4-fs error (device loop4): ext4_orphan_get:1242: inode #17: comm syz-executor.4: iget: bogus i_mode (37377) [ 505.021429] EXT4-fs error (device loop4): ext4_orphan_get:1245: comm syz-executor.4: couldn't read orphan inode 17 (err -117) 14:58:13 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@link_local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 14:58:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000006a00010000000000000000000200000000000000040004"], 0x1c}}, 0x0) 14:58:13 executing program 0: syz_emit_ethernet(0x11, &(0x7f0000000180)={@multicast, @multicast, @void, {@mpls_uc={0x8906, {[], @llc={@llc={0x0, 0x0, 'G'}}}}}}, 0x0) 14:58:13 executing program 3: syz_emit_ethernet(0x2e, &(0x7f00000001c0)={@local, @empty, @val={@void}, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote}, {0x0, 0x0, 0x0, @local}}}}}, 0x0) [ 505.064008] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 505.075413] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 505.105631] EXT4-fs (loop5): group descriptors corrupted! 14:58:13 executing program 1: bpf$OBJ_GET_PROG(0xe, &(0x7f0000001880)={0x0, 0x11}, 0x10) 14:58:13 executing program 2: mlockall(0x43b5062bf4e994c6) 14:58:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 14:58:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:13 executing program 0: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x12) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) socket(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 14:58:13 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@fat=@quiet='quiet'}]}) 14:58:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_L3MDEV={0x5}]}, 0x24}}, 0x0) 14:58:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000700)={'veth1_to_bridge\x00', @ifru_data=0x0}) 14:58:13 executing program 2: syz_emit_ethernet(0x18, &(0x7f00000001c0)={@dev, @dev, @val={@void}, {@generic={0x8100, "8a7aaae5ce26"}}}, 0x0) 14:58:13 executing program 2: socketpair(0x0, 0x14, 0x0, 0x0) [ 505.322763] FAT-fs (loop4): bogus number of reserved sectors [ 505.347617] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.366878] FAT-fs (loop4): Can't find a valid FAT filesystem 14:58:13 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0), 0x0) 14:58:13 executing program 1: bpf$OBJ_GET_PROG(0xd, &(0x7f0000001880)={0x0, 0x11}, 0x10) 14:58:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000002000010000000000000000000200000000000101"], 0x28}}, 0x0) 14:58:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x4, 0x0, 0x4000, 0x0, 0x1}, 0x40) [ 505.375809] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 505.415052] EXT4-fs (loop5): group descriptors corrupted! 14:58:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x76297}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 505.452868] FAT-fs (loop4): bogus number of reserved sectors [ 505.461359] FAT-fs (loop4): Can't find a valid FAT filesystem [ 505.494360] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 505.539646] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:13 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/223, 0xdf}], 0x1, &(0x7f0000001840)=[{&(0x7f0000000240)=""/195, 0xc3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 14:58:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv4_newrule={0x1c, 0x20, 0x1}, 0x1c}}, 0x0) 14:58:13 executing program 2: bpf$OBJ_GET_PROG(0x14, &(0x7f0000001880)={0x0, 0x11}, 0x10) 14:58:13 executing program 4: syz_emit_ethernet(0x74, &(0x7f00000001c0)={@local, @empty, @val={@void}, {@ipv4={0x800, @igmp={{0x8, 0x4, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @remote, {[@timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@empty}]}]}}, {0x15, 0x7f, 0x0, @local, "2f8dc22de0dba6d64e852f3b077e7ff5ba7e627a1d523b28a047e97380003c08b5b6bfa067c6dc55ddfac24430420fee33ae3ffc2ba8d3de69b2"}}}}}, &(0x7f0000000000)={0x0, 0x0, [0x0, 0xefb, 0xad7, 0x872]}) 14:58:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 505.586903] EXT4-fs (loop5): group descriptors corrupted! [ 505.595100] device ip6gretap0 entered promiscuous mode [ 505.620344] device ip6gretap0 left promiscuous mode 14:58:13 executing program 4: syz_emit_ethernet(0x15, &(0x7f0000000000)={@random="06ebb2e04ef2", @local, @val={@void}, {@llc_tr={0x11, {@llc={0x0, 0x0, 'q'}}}}}, 0x0) 14:58:13 executing program 0: syz_emit_ethernet(0x16, &(0x7f0000000080)={@local, @empty, @void, {@llc_tr={0x11, {@snap={0x0, 0x0, 'w', "faf651"}}}}}, 0x0) syz_emit_ethernet(0x11, &(0x7f0000000180)={@multicast, @multicast, @void, {@mpls_uc={0x8847, {[], @llc={@llc={0x0, 0x0, 'G'}}}}}}, 0x0) 14:58:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0xffffc90000000000, 0x0, 0x0) 14:58:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_FWMARK={0x8, 0xa, 0x9}]}, 0x24}}, 0x0) 14:58:13 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x406, 0x0) write$tun(r0, &(0x7f00000005c0)={@val, @val, @mpls}, 0xe) [ 505.715683] print_req_error: I/O error, dev loop5, sector 0 [ 505.738392] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c00000020001fffffff00000000000002"], 0x2c}}, 0x0) 14:58:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000001400010029bd7000fbdbdf250a1f00fe", @ANYRES32=0x0, @ANYBLOB="0800080063040000080001"], 0x6c}}, 0x0) 14:58:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SPORT_RANGE={0x8}]}, 0x24}}, 0x0) 14:58:13 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000000)={@link_local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) [ 505.780853] audit: type=1326 audit(1618844293.743:63): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28752 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x466459 code=0x0 [ 505.790358] EXT4-fs (loop5): group descriptors corrupted! 14:58:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@mpls_getnetconf={0x14, 0x52, 0x4d630483d91299d7}, 0x14}}, 0x0) 14:58:13 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x1, 0x0) write$tun(r0, &(0x7f00000000c0)={@val, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "3df41e", 0x1d2, 0x3a, 0x0, @mcast1, @private1, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "0fad81", 0x0, 0x0, 0x0, @private2, @mcast2, [@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@private2, @private1, @private2, @empty]}, @srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@private2, @dev, @empty]}, @fragment, @srh={0x0, 0x4, 0x4, 0x2, 0x0, 0x0, 0x0, [@loopback, @loopback]}], "0cdb8037f790a8ca5d5f46fc7ab2a79bb082057d8752e1c970e2a92bd14539e4786e2770e04e1bb617c028540d3ce75e4ed246245fdb7facf9426c9138eb9b1f6ae06ca2ffc5a766df7b17767d37fd6bf0ceeb2c76b866262c3d5c3744a596202e4163e5f50dccb07e04b307c56071c887d4ace5425ee7e29bf1fcdbff180be471ac0999caca300448e7fa8b334c5746f8ed0e595cf734a7f07eb5d760dbbeb9a6ef53eafe0c8a1f900bbb105a3239b0771ebfb4d573518f2a486c41f73c0acdb03c186fee25f3411a4205fd093c0c8b09ddb3690e44f9a4a7cc1334ee0f3a65ace48953dbdd6b13cd64e8841d149dedc7b0"}}}}}}, 0x208) 14:58:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="020000001200000022000000", 0xc, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000340)=@delqdisc={0xb4, 0x25, 0x1, 0x0, 0x0, {}, [@TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}, @TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_mqprio={{0xb, 0x1, 'mqprio\x00'}, {0x58}}]}, 0xb4}}, 0x0) 14:58:13 executing program 1: unshare(0x10900) [ 505.870471] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 505.972175] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 505.972175] 14:58:14 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='sched\x00') perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0xa4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x74, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x64, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x4}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x2}}, @IFLA_VLAN_EGRESS_QOS={0x40, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x201}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7fffffff, 0x38}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10001, 0x100}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0xa4}}, 0x0) 14:58:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv4_newrule={0x2c, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_PROTOCOL={0x5}, @FRA_GENERIC_POLICY=@FRA_SPORT_RANGE={0x7}]}, 0x2c}}, 0x0) 14:58:14 executing program 3: memfd_create(0x0, 0xa) 14:58:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x34}]}) 14:58:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005ac0)={0x0, 0x0, &(0x7f0000005a80)={&(0x7f0000000580)=@deltfilter={0x3c, 0x2d, 0xf, 0x0, 0x0, {}, [@TCA_RATE={0x6}, @filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x4}}]}, 0x3c}}, 0x0) [ 506.605509] audit: type=1326 audit(1618844294.563:64): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28752 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x466459 code=0x0 14:58:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x28}]}) 14:58:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_FLOW={0x8, 0x18}]}, 0x24}}, 0x0) 14:58:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_TUN_ID={0xc, 0x3, 0x1, 0x0, 0x101}]}, 0x28}}, 0x0) 14:58:14 executing program 0: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffffff, &(0x7f00000027c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0xf38055be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) exit(0x0) setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 506.759558] IPVS: ftp: loaded support on port[0] = 21 14:58:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:14 executing program 3: clone(0x38004100, 0x0, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r2, 0x891b, &(0x7f00000000c0)={'lo\x00', @ifru_map}) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:58:14 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000027c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0xf38055be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) exit(0x0) epoll_create1(0xbe2febb8a71c661d) setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 506.796347] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 506.796347] 14:58:14 executing program 2: clone(0x38004100, 0x0, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') sendfile(r3, r2, 0x0, 0x8) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:58:14 executing program 1: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x20204780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x40) r1 = getpid() tkill(r1, 0x40) waitid(0x0, 0x0, 0x0, 0x41000002, 0x0) setitimer(0x0, &(0x7f0000000040)={{}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 506.922156] IPVS: ftp: loaded support on port[0] = 21 14:58:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:14 executing program 1: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x4100, 0x0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) clone(0x1000, &(0x7f0000000280), 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) rt_sigreturn() mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000000)=""/3, &(0x7f0000000040)=0x3) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000240)={{}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 506.962433] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 506.973696] EXT4-fs (loop5): group descriptors corrupted! 14:58:15 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 14:58:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xa0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000100)="a2133a9cb97fcdbd8017f826d065d862b1a10bcf50ec491841ecf0c9ec1b9b647430e98906fc15163f0136ae60ef4ce9459c6eb4c6eea25ff3ca8724471ce07854631be34125e5c752c15c98ee3fcd045b279e32d4400add08e3af59", 0x5c}, {&(0x7f00000016c0)="6b30b3c6cf577e9d4ae29d82634f8bec0785372539822761cf0af3ba80fbcbb37c0128e096b30d98dce14262acedb5ab29424f5301dd9e4b2eaa00006cf4f97713817b04e1fe0efd504fc6656da72070793bc0c0f548458faa28502571466b85411c1c8d6049bac54207028ebd848eb477d2926f7c1fd042b6039836b8ffde0c5dd4e8d89748b5b782f725b1", 0x8c}, {&(0x7f0000000340)="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", 0x49d}], 0x3, &(0x7f0000001880)=[@prinfo={0x14, 0x84, 0x7, {0xf, 0x9}}, @sndinfo={0x1c}], 0x30}, 0x0) [ 507.084722] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:15 executing program 3: shmget(0x1, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) [ 507.131997] EXT4-fs (loop5): group descriptors corrupted! 14:58:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001580)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000001440)=[{&(0x7f0000000180)="ff", 0x1}], 0x1, &(0x7f0000001680)=ANY=[@ANYBLOB="1c0000008400000004"], 0x1c}, 0x0) [ 507.585008] IPVS: ftp: loaded support on port[0] = 21 14:58:15 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x25, &(0x7f0000000280)=ANY=[@ANYBLOB="01"], &(0x7f0000000040)=0x8) 14:58:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:15 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x24, &(0x7f0000000100)="e92a8e85c175aafc5f4f4b6e3051e20a7944f6aa4916363b649b5511771e889731b3810ea16c080cd75cb5962cace5", 0x2f) 14:58:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000280), 0x1) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 14:58:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000140), 0x8) bind$inet(r0, &(0x7f0000000300)={0x10}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000680)="259691c549103a", 0x7}, {&(0x7f00000006c0)="e5a17e32c4542a4a4e2a48b831699568ccca0b89edb3a9ce13d6d8c55a885abf07879e95be1f2b6787f5500e7ff7c49d9e6d49c03bd278799ab41446b21cc71651", 0x41}, {&(0x7f0000001580)="209c2467309c07c47edd589e9b8eb282c9dfbbd65d5a149030f9fd781d4aa67407ca7befcd6fd0f9dc3cfec9a023206a5cb6e8454a96a7ced929637956f9c6f5fd6882c35e9da93e45477cad1f0b76f5412b361175872a7088c2a89b160e92bec7840cc3e806dcc26181d20a008b59531d847f093d8a5d5c6628dc798685d35247b8cd64691ebbf79e17dd142efd48a0a8b4784453124e9dca49451dc1c544158b3bc2ba46b18667c3e7b4862bc67e2df5e39d8a4f62d34f9b23e8c88d82415f2671718f723a76c8712ff1dfd621628791d2913fd5a5448f00bf241fd872e840d6", 0xe1}], 0x3}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)='z', 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000800)="fc8477d963a8d3d046c7f5a8b9f25ee4fdd4ffbb7d80ae08254698f1b81677aae5397707e6c9cf9a544fc62efec035e5eb2f8da864cf49498988b8642440619fb618800e13b1b436f8e77482b89e53bd0bf1d8a9eafe0df4519a25fcd946fa9568d46143105a4a8decf255ce8e3b64965a0ab785ce9b05be2cf8b1bd193571640242b0184188c1a5e429e7514db59496ad278d27c4c6e0259451aa1a030ebec39d262b32e5032701aba0ea770d671edbb0ab61ef7b4ede3a032ad4df9d6175946af10d401f", 0xc5}, {&(0x7f0000000140)="9323a70c6b3419e111a29fb93313f0549f4e2b3d8512df5e7304f9c8821fe3e8b28f03a704fe00a0e92b03eeea5db77612f50ef0502176c1e822cbf3b11763c59793193928c47a1a18e944f5dc9f1bc5a4005bb6a713ab6d36b1745679280540f11ce9487d840d216abbc7eabfc57977d567a044c94caf4131d02cd63a6b6b6505fe42d91428db6ad312db819e930863e0eeda3f28b016ed8949cd8d8cbe98f7ff93a835a82f1aeec9052bad8d491709b3b21e72aea0cc782e097aa08bb4271c7117bc68dca9e36bfa337c74349ca50dd1384662c3f334c7fc27dd3e2ed5bc1c4eab4f907d0acb45cb7967497963948da07fcdfd7f635a4e9f28ba19d8a2161158e53de22fbdeba76f7c0eb4b30dc067d4a7cd30caa6d67f111055d707dcd5ae2423de6b6e7ead270b65c4643d5845e0137a0330f5334b701650131854519ea88807ab258ce10e712cbe396fe74f91ba559a29e888c9d90b4585c21f68f0aef48d92f8301107eadcc47b9fe73c9e9665c97afeb5b95b81289d2f5a57baf65cd3d54ca441249109410dc990661f18d2f48b95598d80978aade4346fd3478b0c9a1510fe0008000040f33690d3b0d3821c505e4391fe39e34faae6e9c6173b837cfe1d515f382a1c298c5bd451d5437b4955bb0f364028c70945188a442a56b0674078124191a2ea953861297b32a1dc261578b3423ebee4968cbc0e8a7615e8136a79b840c48483baf7d6df2669d4278debbb8e10b37684e14f296f6d99b1e1c02252287b39efec6e71ca27cc81ed154cb60becad05c3cd73560a26fa4a2887d38978494d7a7ebb04d43b9175b70b6a1eb6101bbed640170658a140f242263125defca6951da1abebade43ef53358454e42b9d07e42f1665ee0be432107208648f4cc2203b4bafc6a54a11e44b5726c72c8e33cde6a88a5ce8251fbb1a20a282a4c736250b19a70c6ad124676b8f2688d09fbb61474383aa7c0150b5b4d0a72d1a98b91b259e39f611aabe86b4df9b9310fbc40a881489894235e1c929b1b209929d732ba90561ab83af1a89074df06eeb639ca98dbbabdad5b7158acae9bb8699bd48e1e9cc688ec67e090fdb1c471766bda90f098a4a8246abae27f15cb9da40a3ebfb2f969b4ec6e6eb7e9964e0856a23d0a64f7059c6ab8d10998ecbe53a05ddeb628535775c9b0d4cc5b2c8e556918ce1dc204f4f34b7cc2e887836756f4ff038d06ccab2d713bf421bdfb02bb46d208076a7120243efdef1871c3a522817a4d009ac3f8fd1736002a13bb68b97396531af57a7408c9d6710b7fb19c48a491103d3304b28d574c2a06f7285948933d2257dd4393a0d8b5fd223b34914fc9a8911bddef37f0601c9634f97c64c98b9fe76488a588e085acb52979168a2050278e343416a12515bbe8c976d08bf4e1b4e4cccfa05419534373e884ab6fd99f89bce6e93afd4eac9554a75694857e81d6570a1db917e72591fcb98a0d98c34baf56d94654b4de659281a027989f0fc7fbbaa6ff2a0baa458f5903ef4abfca3af77f6420dcab47da289d679654fa48cab545f220a20c97394d348fc3310cb5be3e3f5b087e9204a6c101a438b0f3d4efa6e1c3b058f52666602863928723cf3d34e854bd755ece2902ca626e7cea9f6caa02208a120d457795f204fe4f4cdd717e0072d1069533df0aed786420f28e8bcbc3351b30ab47abf8f7", 0x4ba}], 0x2}, 0x0) 14:58:15 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001600)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001540)=[@init={0x14, 0x84, 0x1, {0xe855, 0x0, 0x0, 0x200}}], 0x14}, 0x0) 14:58:15 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x25, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000000040)=0x8) 14:58:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = dup(r0) shutdown(r1, 0x1) 14:58:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup(r1) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x5, &(0x7f0000000000), 0x4) 14:58:15 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB="0100bc74", @ANYRES32=0x0], &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f00000002c0)={r4}, &(0x7f00000000c0)=0x8) 14:58:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200", 0xa, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:15 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)=ANY=[@ANYBLOB="10024e2200"/136, @ANYRES32, @ANYBLOB="d0"], 0xa0) [ 507.769883] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 507.808196] EXT4-fs (loop5): group descriptors corrupted! 14:58:15 executing program 0: r0 = socket(0x2, 0x5, 0x0) connect$unix(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="8202c9e917"], 0x10) 14:58:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000100)="4e28a69f17cca270c79a48627e19dd4b21445ce62db449311b52b821c193c83ec5dda6c2b4662caff36a21d8ba7c59f864b96243ddbbcac1f5ed1d53c6ca0ae745424edea8c021c28a9139a14ae344c92290c63b5b4dd4095ba0f9b35c30e6fa083168992444f185433e77326bfb143d3cb18af71316ac90e9b0b87d478d273a9d2e281d2b7fea1ec52427", 0x8b}, {&(0x7f00000001c0)="670a18ff2ef88a1a8366fe0df3ca66b9d01b02b994e2754f8058cdc3a7a4638eaa86e384f6010f9e5568b19dce131b95b8d1ff9fda95b31e6e8f98a46148b7c65990c8aa", 0x44}, {&(0x7f0000000400)="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", 0xf22}], 0x3, &(0x7f0000001400)=ANY=[@ANYBLOB="1000000084000000080000000000000010"], 0x20}, 0x0) 14:58:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xa0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000005ac0)="2c77e6f96f8ce5c0c0b2754af245d15451ea6b8bd7a204b5a88d7cc09a7a18cd781d4a77cf865fa49662bd879a9b48569e65ebb757b07213a52a17ac9d013c6f275376cba76816ff07e13f69e5719c78831717a96bb7d7b46ab1d183ee1dbab4ea0a232921ff3388e577a355d2f7e9a1dbaa8680a1a7c3bf479bdb08674e2764fbe54b5486df7b1095c37bf32964ac310201ebf74ddd46fdc8", 0x99}], 0x1}, 0x0) 14:58:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x903, &(0x7f0000000000)={0x0, 0x0, 0x1}, 0x8) 14:58:15 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000900)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000380)="6355e5", 0x3}, {&(0x7f0000000440)="144997881f", 0x5}], 0x2}, 0x0) [ 507.908886] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 507.908886] 14:58:15 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 14:58:15 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000980)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000180)="9c", 0x1}], 0x1, &(0x7f0000000940)=[@dstaddrv6={0x1c, 0x84, 0xa, @loopback}], 0x1c}, 0x0) 14:58:16 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000001600)="03", 0x1, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 14:58:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000280), 0x1) 14:58:16 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) shutdown(r0, 0x0) 14:58:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@ipv4_newnexthop={0x1c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4, 0x8002}]}, 0x1c}}, 0x0) 14:58:16 executing program 2: setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000002c0)=@gcm_256={{}, "0316a8e9296ff5bb", "91fb3ae2b2639dbc2b90dd645ba58e1eb091cbeb8a2007e8abd06cf02bbdb885", "48a42de8", "7df1563d35c1eaa5"}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:16 executing program 1: fanotify_mark(0xffffffffffffffff, 0x8c, 0x0, 0xffffffffffffffff, 0x0) 14:58:16 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 14:58:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002e40)={&(0x7f0000002e00)=ANY=[@ANYBLOB="0010"], 0x14}}, 0x0) [ 508.726875] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 508.726875] 14:58:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000000c0)="1fd7358ed8cdb91630e861334c37cf35b0af70718101af4a3f841e1634f589400324798b16add19417c926dd", 0x2c}, {&(0x7f0000000140)="4c7298e58034d171a27bbd97a9ce159060f0e0baaf1116748d2796ee8a39ebc5a9abcde6708c8b1657eade9c084d2e33eb617d9a575ea4efa5baef679a9e01324ce61e90c4b361d75f272dbf04d1a223f02010d6d14200d6cc93feb7adab770798ba7f60d52d8399a921e53a60ea931201eddbc95cb8da5afb67db5355397cf5e4aef89f78d4d9bc41c7ccc50f0841749adbcc1d78aeb6a6d57863335d31ce8db79d9e4a39bf6dce41217fe1b521993a6f75307fa2fdefe2ad1078", 0xbb}, {&(0x7f0000000240)="6534566f5f9f817c963b4e5da5a1e885be8ea5ec198648464edb9d51f7f658f083215da744ec42f87cd1bf", 0x2b}, {&(0x7f0000000340)="f0af2be08fbfb54ce1bc58db4024a52a61c90b1598d657cd0e20faf57901e248032f2707bcaa982aa2ca4c9ce479fef993b935605fea6d399ccfa8048a5b8eac4397860691f1ff52ef34b2292a7813a500387b862ae2f179db38f284829022f6a8df0961d05f64dd0e9ee8e6ef57679b621f263c8cfaf8ab4513d064b395079c5bb11f22d5aa78236eef11e5036c1f4e23e67a5ce182f3bcfe765792ed83ec3416bb46dc53bb640115e00c27d734e3edf56d226eb0106a00fb43", 0xba}, {&(0x7f0000000400)="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", 0x98d}], 0x5}, 0x0) 14:58:16 executing program 3: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5) 14:58:16 executing program 1: socketpair(0x18, 0x2, 0x0, 0x0) 14:58:16 executing program 2: socketpair(0x1e, 0x3, 0x2, 0x0) 14:58:16 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) writev(r0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000680)='i', 0x1}, {0x0}], 0x3) 14:58:16 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) poll(&(0x7f00000000c0)=[{}, {r0, 0x4}, {}, {r0}], 0x4, 0x0) [ 508.839888] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:16 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) 14:58:16 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmdt(0x0) 14:58:16 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCMBIC(r0, 0x8004746b, &(0x7f0000000000)) [ 508.886686] EXT4-fs (loop5): group descriptors corrupted! 14:58:17 executing program 4: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x18, 0x3}, 0xc) 14:58:17 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) read(r0, 0x0, 0x0) 14:58:17 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$dupfd(r0, 0x5f2f4d4900000005, 0xffffffffffffffff) 14:58:17 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$dupfd(r0, 0x5f2f4d4900000004, 0xffffffffffffffff) 14:58:17 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) poll(&(0x7f00000001c0)=[{r0, 0x4}, {}], 0x2, 0x0) 14:58:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 509.017936] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 509.036052] EXT4-fs (loop5): group descriptors corrupted! 14:58:17 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x18201, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:58:17 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = fcntl$dupfd(r0, 0x5f2f4d4900000005, 0xffffffffffffffff) write(r1, 0x0, 0x0) 14:58:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000840)={&(0x7f0000000180)=@abs, 0x8, &(0x7f0000000740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 14:58:17 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) close(r0) getsockopt$sock_cred(r0, 0xffff, 0x8, 0x0, 0x0) 14:58:17 executing program 0: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) poll(&(0x7f0000000200)=[{r0, 0x4}], 0x1, 0x0) [ 509.163415] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="511c114a21d85f16f16bfa478909ce4a11edbdfa765d415b630f818c5eeb4e1569f53c72518e445f9b635bcf41f0e4895defecc8faaa2503ae868e25cac9ca600bccda96cd73becc2048c9c76d0ea08a75373a8ebec17aa6603e8496ae7c0ad62ed6b1d9b140fb2cc45b944ac774b0b433faab354c56523fab035f0c5202c19cc0dcbc4cc761c6b3b1b5f6559a3b3086be", 0x91}], 0x1) 14:58:17 executing program 4: setgroups(0x14, &(0x7f0000000000)=[0x0]) 14:58:17 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) close(r2) fcntl$lock(r2, 0x0, 0x0) 14:58:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x300, 0x0) 14:58:17 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$dupfd(r0, 0x5f2f4d4911de700a, 0xffffffffffffffff) [ 509.235463] EXT4-fs (loop5): group descriptors corrupted! 14:58:17 executing program 4: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f00000001c0)='./file0\x00', 0x200, 0x0) 14:58:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:17 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000280)=[{}, {r1, 0x1}], 0x2, 0x400) writev(r0, &(0x7f0000001740)=[{&(0x7f0000000340)="fe", 0x1}], 0x1) 14:58:17 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) fcntl$setown(r0, 0x6, 0x0) 14:58:17 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) shutdown(r0, 0x0) 14:58:17 executing program 1: pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) poll(&(0x7f00000003c0)=[{r0}, {r1}], 0x2, 0x0) 14:58:17 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1004, 0x0, 0x0) 14:58:17 executing program 3: mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) munmap(&(0x7f0000cf8000/0x4000)=nil, 0x4000) 14:58:17 executing program 0: poll(&(0x7f0000001400)=[{}], 0x1, 0x3ff) [ 509.431234] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 509.431234] 14:58:17 executing program 1: semget(0x1, 0x0, 0x225) 14:58:17 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) 14:58:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x1}, 0x8) 14:58:17 executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fchdir(r0) 14:58:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:18 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffff08c}) 14:58:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) 14:58:18 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TIOCSPGRP(r0, 0x40047477, &(0x7f0000000080)) 14:58:18 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) poll(&(0x7f00000000c0)=[{r0, 0x80}, {r0, 0x40}], 0x2, 0x0) [ 510.231887] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 510.231887] 14:58:18 executing program 4: poll(&(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x0) 14:58:18 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read(r0, &(0x7f0000000100)=""/109, 0x6d) 14:58:18 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) bind(r0, &(0x7f00000000c0)=@in6={0x18, 0x1}, 0xc) 14:58:18 executing program 2: readlinkat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0) 14:58:18 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000100)=""/57, 0x39) syz_open_pts(0xffffffffffffffff, 0x0) 14:58:18 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1025, 0x0, 0x0) 14:58:18 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1003, 0x0, 0x0) 14:58:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:18 executing program 3: setgid(0xffffffffffffffff) setregid(0x0, 0x0) [ 510.393139] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 510.417688] EXT4-fs (loop5): group descriptors corrupted! 14:58:18 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 14:58:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xa0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000004ac0)="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", 0x585}], 0x1}, 0x0) 14:58:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:18 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sched_getattr(0x0, &(0x7f0000000000)={0x38}, 0x38, 0x0) 14:58:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:58:18 executing program 2: syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @remote, @void, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @multicast1, {[@lsrr={0x83, 0x3, 0xcf}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e3a74d", 0x0, "c296f3"}}}}}}, 0x0) 14:58:18 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000003100)={@random="b7546351ce42", @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "c3b582", 0x28, 0x0, 0x0, @empty, @mcast2, {[@hopopts={0x0, 0x3, [], [@ra, @jumbo, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}]}}}}}, 0x0) [ 510.593002] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000002180)={&(0x7f00000020c0)={0x28, 0x2, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}]}, 0x28}}, 0x0) 14:58:18 executing program 1: r0 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 14:58:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:18 executing program 4: getrlimit(0x59810fcb04482d0e, 0x0) 14:58:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 510.653005] EXT4-fs (loop5): group descriptors corrupted! 14:58:18 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000140)={@remote, @empty, @val={@void}, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @multicast1, @remote}, @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}, 0x0) 14:58:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:58:18 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x6e580, 0x0) 14:58:18 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:18 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000080)={@random="19f000a7c29f", @local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "3bd987", 0x44, 0x2f, 0x0, @dev, @mcast2}}}}, 0x0) [ 510.751489] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:18 executing program 4: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) 14:58:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000180), 0x4) 14:58:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:18 executing program 2: syz_emit_ethernet(0x364, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd663256f4032e2f00fe"], 0x0) [ 510.795814] EXT4-fs (loop5): group descriptors corrupted! 14:58:18 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, @parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote}}}}}}, 0x0) 14:58:18 executing program 1: pselect6(0x40, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 14:58:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:18 executing program 0: syz_emit_ethernet(0x37, &(0x7f0000003100)={@random="b7546351ce42", @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "c3b582", 0x1, 0x67, 0x0, @empty, @mcast2, {[], "19"}}}}}, 0x0) 14:58:18 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f00000004c0)='.log\x00', 0x40, 0x0) 14:58:18 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) [ 510.934606] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:58:19 executing program 1: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001900)) 14:58:19 executing program 0: syz_emit_ethernet(0x37, &(0x7f0000003100)={@random="b7546351ce42", @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "c3b582", 0x1, 0x67, 0x0, @empty, @mcast2, {[], "19"}}}}}, 0x0) 14:58:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:19 executing program 2: mq_notify(0xffffffffffffffff, 0x0) [ 510.998057] EXT4-fs (loop5): group descriptors corrupted! 14:58:19 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000580)=@hat={'changehat '}, 0x1d) 14:58:19 executing program 3: syz_emit_ethernet(0x3e2, &(0x7f0000000140)=ANY=[@ANYBLOB="19f000a7c29faaaaaaaaaaaa86dd6221823303ac3c00fe800000000000000000000000000044000000000000000000000000000000002c"], 0x0) 14:58:19 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) 14:58:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000003100)={@random="b7546351ce42", @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "c3b582", 0x8, 0x0, 0x0, @empty, @mcast2, {[], "19112fdf144b2bad"}}}}}, 0x0) 14:58:19 executing program 0: syz_emit_ethernet(0x37, &(0x7f0000003100)={@random="b7546351ce42", @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "c3b582", 0x1, 0x67, 0x0, @empty, @mcast2, {[], "19"}}}}}, 0x0) 14:58:19 executing program 4: syz_emit_ethernet(0x9b, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x7, 0x4, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4}]}}, @parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x19, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, @remote, @rand_addr, {[@rr={0x7, 0x23, 0x0, [@loopback, @rand_addr, @multicast2, @loopback, @empty, @rand_addr, @rand_addr, @broadcast]}, @timestamp={0x44, 0x1c, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @rr={0x7, 0xf, 0x0, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}]}}, "89e60fdfec"}}}}}, 0x0) [ 511.120393] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:58:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl0\x00', 0x0}) 14:58:19 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, @parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84}}}}}}, 0x0) 14:58:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:19 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@local, @remote, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast1, @multicast1}, {0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) 14:58:19 executing program 0: syz_emit_ethernet(0x37, &(0x7f0000003100)={@random="b7546351ce42", @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "c3b582", 0x1, 0x67, 0x0, @empty, @mcast2, {[], "19"}}}}}, 0x0) [ 511.161602] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 511.190592] EXT4-fs (loop5): group descriptors corrupted! 14:58:19 executing program 2: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv4={0x800, @dccp={{0x7, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @multicast1, {[@noop, @ra={0x94, 0x4}, @lsrr={0x83, 0x3, 0xcf}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e3a74d", 0x0, "c296f3"}}}}}}, 0x0) 14:58:19 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000003100)={@random="b7546351ce42", @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "c3b582", 0x0, 0x67, 0x0, @empty, @mcast2}}}}, 0x0) 14:58:19 executing program 4: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)=',', 0x1, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) 14:58:19 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x5, 0x0, 0x0, 0x70bd2d, 0x34ff}, @sadb_x_nat_t_type={0x1, 0x14, 0xfc}, @sadb_spirange={0x2, 0x10, 0x4d4}, @sadb_ident={0x2, 0xb}, @sadb_x_policy={0x8, 0x12, 0x0, 0x23a9a1d2bbcc1675, 0x0, 0x6e6bbe, 0x9, {0x6, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @in6=@mcast2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}}]}, 0x88}}, 0x0) 14:58:19 executing program 0: ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x0, @inherit={0x0, 0x0}, @name="cafdb987bf2246cbf32bd80f4c931849aa12ae9228f73a35ded8afb2a6f1b3b5e146a26bb7fda3eb50ee8760110d0cc568bb98e1dea7f31d3f96de8ea9f0ccc6fa638bde18618a11d0d0f56d088c836ecbb4758a151151907d0e7d79fbfb3c387739786228875d7d5e22704dc1adef45e2b3059247ded0d64846cc07a6834a0620a5dc7bdc456f57d0d3b0e419b7b13ef1a1a8ad707bccb0014eae4824d8f6148e6fdac1eb5650aea8e74b0c569e8db9f97cc7f1bdcbe4d3c4d51be360d548f75348fb6312bca5a6837d750e637092ecbbd6f2b93d82c1c589588ee310b5939f3936e3b000e82a268b75341afe0d83e39a915037a4aad8bedb1957874d47564f92b30cea259143996aa686ce6c932534a0cdfd1e1b3a2f5c6c8b81a06bd054d9324c20424b2db2d87f65d3a6f662c7db851b3e287a661a84d52531fac959cf5ef25a6e3d9797d0b6e6d414f2b1cd31f7d43b2b4089ad40f4f732b9d60ee004cbc3fb65b62668880d9d8ccdee3f9b7d947467ce71bac487476032e42a0e53c4ed9b68e6ff9419598264888375019546a2017f3e85aaf94735e2cb6d8f2a6ea21c7e88cd3ac55d4d60ed7fc077dc3337e92040b2559804596385b441a963bcef4448a7dd1762a6d41f7c1c8d23d2f47c9160408e23bb4a715f5c5ae83fb27df23b8dfe865f145e143f6793fdea8552c494ce7a95c0b8e3dff51657e6a86a90bcdec4d3a207af41b06035eab3642c1f9b230433f2b82a0a3cd6fb9ad3fa24b16021566f8d2c3dc8b9c372615ab5339d621cb6668051eda1ee20c597d6038b9306fc3bc2e794fa35be8700871c4475514ac5d0f70bb63c531d4bed1760af530da3fcf48ec3eb62cf78331fd04105692729afdd718d8ead609d66e54c3e74dff2515fdb17d3856e5db0d735e892f5381b192da93449c4a78837991843162d66ce5c40058d5e56e6340b1706d738751baedd6dd1f312e24c16eeca6f6af8bb73186cae2398a3dbddf681b786f60203565202d2f74d3925f6327d1d66492333a71cfa9d373dbb6b692aa142330d3e02f763bbe3dd36abf7dae00e158e15dc22c37b675303a83b8116089187dd62633c46f84ab55b8cc45fd29315753550cd14397517ef6b00960575d0b1bf5471a9366ab69d1bf84828caafff8d431b01446b6ac73d9c539a16803a17c87996f9b2d5100f76a18e8cf98c3ed3f49aa0580e6a8bcba1dc79dce1314880ec87f273e5cd42794143c9f1acdf25922ce5bfa171add5be005cfbfdb4d9bc60391dcbb8f335d6a6ced77b193f4eeb89e285fd67e35c4f07790c881871e15b773e1d6d2d35c8fb97c5317c31cde7032629024abfae47562079a06837a9394bd5238b573c593857f1ade016f1095d9f643de2e96b2010571b3f9e3bde4dce3f50b4e1a5eabe25c9edbefc1d75c26664b160840da09c69709980396caa7071542841fb954f8db855fa658893b6fed4856f6c163b1e0bc7f8363c925d39a32605a7b39291c3749f08b6077830fa24524fe72f0d193cb15cb35cf22b197fa83d29c33ff4d719eccabd2f5b0b16e95acf63190dded07ca21c65ccee3b743093a9ceef33298454bc3b8927eea6106c940b3c8456e822c56d097ea29b97b3561eeaa7de559f471956a54b38dbb7c27c4fa17baa80feb4a2bb7ec9dda30a9963ae3a83aa10e20d1aab58ae99cd490393ceae3579c32c34cedd89d69e93babf3f1c30b77c5a48d28bc4176e80cf5711f6c55799e93c09d896b1382ba85089f8e97778bb4f3c73ca7c61582b7049e8d284a2f45676e9cd25bc1725f4252ec4897bcba89b6fc8665b4616b8174d07512d7f8dbd8842f2b0668d0b01d1c2a888203791dbca0727f30c3e226219fb0834e0975f9a5983c419dcb5f71bbb03543eb5eb658e7cf129621a583ea8bf6f40cf61c576831e38d9cd0ab33baf4525825fb4526a71d8f5a1ea4034b8e814b08249c7398f663de364697a5168f6b0a0165aa7a6710adbed43ab5accfbd8c01cbe93e0db21cde9342271a08b84c16c88d42e51d9fd89b9432316f86677cc8d3f7e319692efec0d7845b13a1b84372450764625e4c5172e2100b5a01a9b1f0218e25dab6c1e41c2e46219ea43389ad66edccb55c5cf82b7d30607c1cbcc87dffa7fcba2373763019dd53adbadd8b15fa57cd1014466fd6c959356fb5a8412bdb957aaf65763cfcfc4721325098d6cd891ee7089d6b8d892acce4aedbfc663f27fa3bf7a2a95314008ea105e2c4e797e589943122e659eea0e646a039bdbc0087aff71b37852ca3fdd753703b7c1af423fa9ac7ad236caab5f346e1d986c91a9aaad1615b326f0e1450bdd084cfbb11e5043df836b5f950df076f52ceef070adb7184655cbf8c1f20bfa5ce70b28af35b347d81288194b912929f98a8c5642f0c794eb17aca961a2c622f4929a83dd987b7af362293bbddb40a1c906f7560d5e13f686b2baf0019b850a237a0e231ac29eb095b4ca56c5201883a93340e884d3b1259f48a4674a2c37d1baaa7d4995658304192e5171bb0e1280e2548706874a2cef8065cff39b772fc2c824d8e45bb1507316e912881a4c290c449eea21fbeda8e9ff664e2e52c1ceb5a6e09ef8f20b42089ba8f2a250817c7cb48cc0857aeac7416cc8b423bc15d3db8a261bc0cfe6363f89ed7e20ed3a0844d17d1a6fd9fd4a91d62b078fbf0d9d109afc28993e535233ce4ea78ff1f80838181b2bae15ac27852476e205b918d20952ab240aac7301f5ce32ba5975b21c6e15b425b4e81e7582a89d880b37836bf634adc53c9b687327493d821e825643b063294b82978d1bc5422df28f79a140a91c1a6eee07ae756e9d2d24c5cceede3064ef76e6e43680329071d59840fa42892435b802550ca8df7778462e208e504ec9212149d7d5e3b59aab1d3d7e3353c4bbfed8be2ad7c17315642ae722bd77e462e2c0f8e77393ae1f8308534afeae42f788d785f769c9743fc536d1e525c8d67671ac26d8ed8b0dabd2e056a4ee56b757626571e520669842b02fb28f52a92ad7e5ab2e7d893de135e1504eefb1ac1b6adb0b87476bebba1aade3e0226bdbe7fd5ac38b8bbdf611aef8e3d9cffae21897456aa42d6e466a9752dc81f0c77d3c0ded87e413277372a94685859953285372cc76d5f728c821fd7ad453b696b7d914cc1a56e546168a3dfc6472ffc76220b9af25fca1e8d1fb48ad8c879d691736d60b0bdf9bbfc6bcc36925e5b7d7e93b187018251b977e5844198a202969233b13b08bfaf31da193f72422a8d1e6b045e163a4ffe25350d717c4e7db19bed51dcab354e61d3ece4826d0552c82a8c89a5f7006dbbb85232962e9dacd736281577637715b58a98f68bce42c81fe1df68381f4bb428b5bf2a43cfc439c64b76f390bde69edbc120fe6fe12a4ca29bf14714fb0c906dfcefc54cb47696a9a19bef1b955fc0674f055eb2169db35a2f12082c89c53b697cdc692b9a09b345a4c7697a557cae48ef4afb2334b759996c4a3076228ae57cb4a66fd5f276672bfa197f9d18c3b50d241b99e4c050a936154a752d63c6558aa377ae4d8e48b566b08ff7a3ce45e3aa9c86df5722ab3459f6f736ae1fa16b8539cb594ef7ec39b98d446fff03e240044911a27f6cd24c2a4946057e8d8ed26636644ead17942a4fe1596136f2ce63c8dfe1992040954607c5a68f23838a15c9492ac6b754a95221a61d82c8ad556ea123bb7b49b38811bc7b6eca58c2e3ac668018806e103124d0f4e6bbfa4a33d93176f118c50593ac2cfb87b2a37e49d93c57d85254b28f9c688a1a4765410a8b079737c1cd8d39bb469485bb57a91daf4703d6494b0573ac15b6ac797f475c32ba323db71649af73f23b103cef90ac8af05f58df26362fe05eb3fef7aec0d562be0092b9cdeaf7556236cbc01d5dc1383bcbdfcd44c30e52cfe3c3ba4ad9ac8f016a04928dcbcbe5b514d2196bfa6898ca8f03305474eaba30d1dab805869df29dfc60f5edb74035ceec027b8cb67131b280cb217a2ca21da595c6e7524022fd26d79f081e736ec426b613650c3942987245ef9613f9191f1ca94903efe43183c1c5b4e6fd59b2f4dfa049df19ca2fb72829094fccd2658ab85ebf1ff5618282de30995802b03abe333bf944d2349a220e66747285138345481a5d546dd8ccbbad193c6abf5a1557c6e503c03e65beb63369d9cdf05b2a10f17eb9fd1edebed339dffa62178ddd838de51ed488bafb74f8795c8176da8365bf792ea0fad62f884c115dc8b05082d27c500b13e2ab51436fadd5ef6e4481a106fe25d7656d1e2887311a91d3e2866871e1fbf044100505fbedc3203c978f018a8c7e4c6ed8a8b178058a26650bde74268b0240ea906c0ab7346c36e8641e6c3fd85baf94407b8e65de2abff1cac5e822f00ae45b2895bd90ae75dc966738d574a6bdc723422cfd34f92536b8cf3d731603dfe723914fb6bd8d1f03eed9836c72140038d2fc1a33f039cb88acaf1e8fd40e643dad8433f8b9328f466f96da8aaf8cad3037a09852f1efff94c32a599b1aee9970e7f7ee9604d7dff3bf68ac36fdd477dc6d93d46fd9fee51381787cd69c503912c0027b25534260687248b2ae8874a1192ebc943cebe98221871a76a061472bc22f44af6bd02473a28b4ffceb5c96976054ed3668da976f936ca7ffc8358cb97d70831c653c6d8a65a7579e9c1f1e5b6b379052cf383994e979dc0b713caab96ded1b639900d0d4b06c94fc3d381572a101c0031a0b49ee2a21efc980a2fba878fd5588b74a459b7f82f02d95dbf6aa55cdf7a7a727a530f3a8524cedea56c029b18bdae78c383979aba3896e44e0cbe56db183ddb31e72fcbb2f0f4248849f8cff543dccc4cb6b45a55ebcc4159ae5b67dd0716ac0584a9db9de6b0140b2f1a9798a491aa8d186139ddc39663453e28965197ba05bc9cedd4d625d8bd747a391a69d4b0c88d34eb1e5e70335254b703e7442854965fc9a6318bcf6f5ea71c9734db8ee9293506c17350a6fcecabeab99aaebf05c850c8f22fc9097c3d05056d5d6139379d2a4656ffe86b8f146ef89d84c3f56463536cf91f374eb2c812df2e41623054b3894bb1bb40d31caea5b4ba4441c93afba6e999510ef67788d3339555c630362c7e1295c6ea380c08ec8c30de61b8e0ff864d77f5209689f77c7e6fe65d2fda384ead56d8b2763d76a68a33ef26a3d52fd166eae858a17aff94721b675d9bc3b021f556b60d98b3f2aa43423cd7ad293aaff7b5d107b46dfb4208f40df038e02193634e104e2a3efb7fe7a14fb96877e13ce084ed2cb5f4f7a043b062aa4d0293d6addada6c0dedfafd770868db0d14b36545beb510466d73399792db2b83b4e8be5330a09f347968297b1f123e60bd08292f52f318e957aad643f83818982052464f04e9ba8c795a8583cc469ba736d78c7c7e6d87b6d45517ff249dab754a998959f41daa6236391224711a0aa5fe124cab632263aad9302162d7af8f37873d42e0114d51ddac40f14a39e4282dbedfa278485f46e6bc64d38364380f270ba7d72da7ed6e09577bdd3231e8ec89235dd29c44f3996a8907223c6805a65f33e33c1c6cb3371b75fc56bf8337688f3c784f039774b2a6a3e3ac32d218956221cd9366efe5d3e1112d66e765d3876bab5b74a39ed4351d09e3678183b90d68e03a64d47b3e26c39a43045e9a8c7b"}) pipe2$9p(&(0x7f0000001840), 0x0) [ 511.311477] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:58:19 executing program 2: setrlimit(0x0, &(0x7f0000000000)={0x80a}) 14:58:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000001540)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000001580)) 14:58:19 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '$\x00'}, 0x5b) [ 511.399161] EXT4-fs (loop5): group descriptors corrupted! 14:58:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x2, 0x4e26, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xd, 0x1, 0x0, [{@broadcast}, {@remote}]}]}}}], 0x28}, 0x0) 14:58:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, 0x0) 14:58:19 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000000380)={&(0x7f0000000140)=@l2tp6, 0x80, 0x0}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'batadv0\x00', 0x0}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000dc0)={0x0, @sco, @ipx={0x4, 0x7fff, 0x4, "fc14c1fa256e", 0xfd}, @xdp={0x2c, 0x4, 0x0, 0x10}, 0x45, 0x0, 0x0, 0x0, 0x3c7d, &(0x7f0000000d80)='veth0\x00', 0xfffffffffffffffe, 0xd835, 0xbb5}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000001640)={'syztnl1\x00', &(0x7f0000001600)={'syztnl2\x00', 0x0, 0x1, 0x700, 0x7, 0x5eab, {{0x7, 0x4, 0x1, 0x0, 0x1c, 0x64, 0x0, 0x7f, 0x2f, 0x0, @remote, @local, {[@ra={0x94, 0x4}, @noop]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f00000006c0), 0xc, &(0x7f0000001800)={&(0x7f0000001680)={0x158, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x14088080}, 0x40000) 14:58:19 executing program 2: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, @parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @rand_addr, {[@end, @noop, @timestamp={0x44, 0x1c, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @rr={0x7, 0xf, 0x0, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @cipso={0x86, 0x1d, 0x0, [{0x0, 0x8, "655367047c70"}, {0x0, 0xf, "883723789d507c5fb25036cb25"}]}]}}}}}}}, 0x0) 14:58:19 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x3, 0xffffffffffffffff}}) [ 511.533410] audit: type=1400 audit(1618844299.493:65): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="$" pid=29385 comm="syz-executor.1" 14:58:19 executing program 4: mq_open(&(0x7f0000000000)=':\xaa+\n$},\'\x00', 0x40, 0x0, &(0x7f0000000040)) [ 511.581176] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 511.581176] 14:58:19 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000002900)='/proc/sysvipc/shm\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000002240), 0x0, &(0x7f00000022c0)={0x8}, &(0x7f0000002300)={0x0, 0x989680}, 0x0) 14:58:19 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000001440)={@broadcast, @local, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}, 0x0) 14:58:19 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '$\xb4\b\xff\"R\xff\x9a\x00'}, 0xf) 14:58:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x8060) 14:58:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:58:19 executing program 3: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) [ 511.780158] audit: type=1400 audit(1618844299.743:66): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=24B408FF2252FF9A pid=29441 comm="syz-executor.1" 14:58:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:20 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x200200, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 14:58:20 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000140)='.', 0x1) 14:58:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001e40)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001c00)=""/190, 0xbe}], 0x1}, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[], 0x3f) 14:58:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x26) 14:58:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 512.371373] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 512.371373] 14:58:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:20 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000b40)='IPVS\x00', 0xffffffffffffffff) 14:58:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00', r0) 14:58:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:58:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x2e01) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 14:58:20 executing program 0: pipe2$9p(&(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRCREATE(r0, 0x0, 0x0) [ 512.579301] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:58:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:20 executing program 3: syz_emit_ethernet(0x10, &(0x7f0000000fc0)={@local, @empty, @void, {@generic={0x0, "2aeb"}}}, 0x0) 14:58:20 executing program 1: syz_emit_ethernet(0x5e, &(0x7f0000000080)={@random="19f000a7c29f", @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f1f608", 0x28, 0x3a, 0x0, @loopback, @ipv4, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @mcast1, @empty}}}}}}, 0x0) 14:58:20 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x328180, 0x0) 14:58:20 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) 14:58:20 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0'], 0x88) [ 512.627699] EXT4-fs (loop5): group descriptors corrupted! 14:58:20 executing program 1: clock_gettime(0x5, &(0x7f0000000680)) 14:58:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x1) 14:58:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x1, 'lo\x00'}) 14:58:20 executing program 3: syz_emit_ethernet(0x3a, &(0x7f0000000200)=ANY=[@ANYBLOB="0180c2000001000000000000080046"], 0x0) 14:58:20 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 14:58:20 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000dc0)='/proc/tty/drivers\x00', 0x0, 0x0) [ 512.715081] AppArmor: change_hat: Invalid input '0' [ 512.753102] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 512.805084] EXT4-fs (loop5): group descriptors corrupted! 14:58:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:20 executing program 0: syz_emit_ethernet(0xd7, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0xe, 0x4, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x1f, 0x0, [@local, @empty, @broadcast, @multicast1, @dev, @private, @private]}]}}, @parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x21, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, @remote, @rand_addr, {[@rr={0x7, 0x23, 0x0, [@loopback, @rand_addr, @multicast2, @loopback, @empty, @rand_addr, @rand_addr, @broadcast]}, @end, @noop, @timestamp={0x44, 0x1c, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @rr={0x7, 0xf, 0x0, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @cipso={0x86, 0x1d, 0x0, [{0x0, 0x8, "655367047c70"}, {0x0, 0xf, "883723789d507c5fb25036cb25"}]}]}}, "89e60fdfec"}}}}}, 0x0) 14:58:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000000)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x80) 14:58:20 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 14:58:20 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000002500)={@dev, @remote, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "41ff06", 0x14, 0x6, 0x0, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:58:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 14:58:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:58:20 executing program 3: syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @remote, @void, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @multicast1, {[@lsrr={0x83, 0x3}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e3a74d", 0x0, "c296f3"}}}}}}, 0x0) 14:58:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000003c0)={'syztnl0\x00', 0x0}) 14:58:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 512.993139] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 513.055486] EXT4-fs (loop5): group descriptors corrupted! [ 513.061613] device lo entered promiscuous mode 14:58:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/47) 14:58:21 executing program 3: syz_emit_ethernet(0x364, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd663256f4032e2f00fe880000000000000000000000000001ff0100000000000000000000000000013b"], 0x0) 14:58:21 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:58:21 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000580)=@hat={'changehat ', 0x0, 0x5e, ['/\x00']}, 0x1f) 14:58:21 executing program 3: syz_open_dev$loop(&(0x7f0000001540)='/dev/loop#\x00', 0x0, 0x0) 14:58:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e0e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:58:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:21 executing program 1: r0 = gettid() timer_create(0x2, &(0x7f0000000380)={0x0, 0x1, 0x4, @tid=r0}, &(0x7f00000003c0)) 14:58:21 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@broadcast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @remote}, @parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @loopback}}}}}}, 0x0) [ 513.204959] audit: type=1400 audit(1618844301.163:67): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=29565 comm="syz-executor.4" [ 513.230362] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:58:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'vlan0\x00', @broadcast}) 14:58:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x40) [ 513.291930] EXT4-fs (loop5): group descriptors corrupted! 14:58:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001f40)={0x16, 0x0, 0x0, 0x9}, 0x40) 14:58:21 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000440)=ANY=[], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 14:58:21 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\xb3\x01@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0x2, 0x0, 0x0) getpid() r2 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xe, r0, 0x6) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xfb, 0x1, 0x0, 0x0, 0x8000, 0x2000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x4000, 0x9}, 0x40, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, r2, 0x2) 14:58:21 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x500, 0x0) 14:58:21 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x490001, 0x0) 14:58:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000008cc0)={0xb}, 0x40) 14:58:21 executing program 3: sendmsg$inet(0xffffffffffffffff, 0x0, 0x799db0eba21eb5d3) 14:58:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x0, 0xffff990c}, 0x40) 14:58:21 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000011c0)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x10) 14:58:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000940)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000040)="a510e6ff82b53227320528d8061e31c69b46ea72dcbb1669441a0ae287e105691b0c4cad0cae39b3fb04d141428ceede8a7e1a916ed2e7c6f991e85aeaf5dfe72cbe2aac4f5cfe7933c8319a893532c561899ca7118a30923aca583f4d1a242b959e96b93353d6c876d7063ea68a32f5a88b8283a4df295fa399a2288cb41e791c56a91527997a", 0x87}, {&(0x7f00000002c0)="712cb5d43a87e74c174d70406813a8986be21d660cb4e7b6c456a150f0629b06ec66a853894888a720004c383136ec7f67d23325f05522cb873eab25460592b6f23c19fa0f31beaf32d1559a57e9108218937c287734ec00cd804c7e90cd916547faaeb2c2deac57273ffafef30f339047a43ce5e47cc0960de1bd62fcde44501df66ee1bd16f9d700e94c27cb4d00ae8ae0693e2621f207b5269f580c0130c8f7310a9011db68fbc6268b69021f8bd172c0079290097f5ea87cd2e45958693d310d42a3a2da16044452a27e0b10ea405255681a8acdd8b33885bb5324769c37d2748c856e914f790fa70000", 0xec}, {&(0x7f0000000100)="53d4e85e024e8eaebc50bccdca3a8b6714eb93e68938456f83f45b7faaff23455f9ecfe4d3daa1f1b839102bdf5666ada188ec8aa2599e24b18b57af3cefd91788e2a61a9103b66d17c73eac451123fa3e14c7cb199a8f5abf993ab9fe27", 0x5e}, {&(0x7f0000001f80)="ddabcaf7fb8c3861cbdb8752bf3c60002eddd1146827ca317c5b52609f34e53e000b0fecf420508c9e11591ceab45dc129b74416385bed331b3ffe0404f60ec77ee42c985f7b0f4d0abeec31baa756dac8672a7fd253fb83e087d9371d9fc404f6fb8d5ef7bdcdb4d62243afa12655dca2958ff52cd49830ebe9", 0x7a}, {&(0x7f0000000440)="886f346a9d184b94e7b388d998b9767ad48433e8f05e831c03617540b56e4eeeff6d2e592418d7dea791ba3e5b28495b1b3a2f9517754de1d80dc84dbe8eb490331c506ed588c67164049a2f43b77d2332eb77fa280416983c2a8d5f4b9a5b72913006e0d606afceef3dbb6bbfab850565b01dc688314d86ac41f09b6b1ed6a4b5bc9d66a07bea93b6e604d4c0d43445518767a69280047fe2d84fae3b1cef6667d5cbe34b43dec94fde8f881dab43c23b3ad1f42672b7407e68d833bf12a6551beb49409189783b29b00ffea37eaa294afba07d712046936eadcdfc3c", 0xdd}, {&(0x7f0000000540)="1191675ce0faa6a84a88e784ad0826b5ae6c55693df53c10b99b790bfe623ead9535886dea3acbda115058c6f8cb1bb8da67b4858794872c52feac60da82069e452284e273d0c7c24224537cf6db0ea7fa019ef750552368ef82fab60482b3b25d3bc60008d77ddf71e28c27f53b6199e98c868d9fe3cb69133e1a9f74965afc2f42d6b74c7e6c31230a024197d055ae9608cd3eb34a93353c808c347a66cbbc63b98506258b7fdc356892ac683659610cc9a7304d2ab4300239da60546ad3578ab126368a655ba5709a12", 0xcb}, {&(0x7f0000000640)="725613085db86ded9c7ded016ae7375a9a1dd9c31c780fb8756dad", 0x1b}, {&(0x7f00000003c0)="e00424c9505a1fc4d80000000000000000000000e4ff00", 0x17}, {&(0x7f00000006c0)="1cd2ccd078a9848f4e7e2c12bf442ef562cd737c0442d60ea75a9aec6d617929ea5c60463a8b651b4df20a565f40b1007327c7456c98c5fcd011c6a1e698b120f3023c9f086a4c0b3caef520eaec0cf2a31bbdc605da562ef9ae6bfff79985af4de035a4591dfab4", 0x68}, {&(0x7f0000000740)="39dd5b90fd045177", 0x8}], 0xa, &(0x7f0000002000)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0xfffffffffffffe38}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@end, @rr={0x7, 0x1b, 0x0, [@rand_addr, @rand_addr, @multicast2, @remote, @broadcast, @dev]}]}}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}], 0xd8}, 0x0) 14:58:21 executing program 3: socketpair(0x2, 0x1, 0x0, &(0x7f0000000140)) [ 513.477289] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 513.509895] EXT4-fs (loop5): group descriptors corrupted! 14:58:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4}, 0x40) 14:58:21 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5}, 0x10) 14:58:21 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x106) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 14:58:21 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000380)) 14:58:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000080)="8c", 0x1}], 0x1}, 0x0) 14:58:21 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000040)="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", 0x1000}, {0x0}, {&(0x7f00000010c0)='4', 0x1}], 0x3}, 0x0) 14:58:21 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x16, &(0x7f0000000040), 0x52d) 14:58:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x1, &(0x7f00000000c0)=@raw=[@jmp], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 513.694565] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 513.705777] EXT4-fs (loop5): group descriptors corrupted! 14:58:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) 14:58:21 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x111e03, 0x0) 14:58:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/171, 0x5b, 0xab, 0x1}, 0x20) 14:58:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[], &(0x7f00000001c0)=""/171, 0x5b, 0xab, 0x1}, 0x20) 14:58:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000340)={&(0x7f0000000040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x80, 0x0}, 0x0) 14:58:21 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000001900)='/dev/net/tun\x00', 0x1, 0x0) 14:58:21 executing program 4: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000011c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 14:58:21 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x410202, 0x0) 14:58:21 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) 14:58:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4010744d, 0x0) [ 513.895825] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:21 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0xd4, 0xff, 0x80, 0x0, 0x6, 0x1001, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80000001}, 0x0, 0x0, 0x9, 0x4, 0x1, 0x9}, 0x0, 0x3, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x3b, 0x1000, &(0x7f0000000040)="6006f3af4aa23f1d82f0a482715cefe34cca89a9b4ddd485d99938c3a3bc0b888577cdf1038042627e6efff30fe6bade40e3d99d1fba84e8d9daf3", &(0x7f00000006c0)=""/4096, 0x0, 0x0, 0x0, 0xe6, &(0x7f00000002c0), &(0x7f00000003c0)="bdfeb7e99e53ae007b278bd822d3702e47ca74f716cf53e9e259cf54e1ff8cdba380333ddfbf0c61af34c145aaeaa3608162aaa4cca407b71354eec32564d47fb54a27c725c15bb8b5ac447f9b7069a96d70a7aae4fded7aeffca82c029436791ddf94e5fa41e56f6b2e878dd8af373b94b8de2db175099fecd602d57e27e0a18372ed9d54df020b29e2c9b87a9ec82b48e2f528d6e5c9026bf6107612f43d09e5e212df19b6591479c3adb693df530471cd74466b7007476bc6fcf344982461b028d2def1d6f6a1b1631bbff4a7ad28b6047d1e7c1148479774b338cc788418b05e66955f2a", 0x0, 0x3}, 0x48) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd3a}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xf, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000240), 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x1, 0x9}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='xprtrdma_op_free\x00'}, 0x10) openat$cgroup_ro(r0, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100008, 0x500001c) openat$cgroup_ro(r0, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) 14:58:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:22 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x607, 0x0) 14:58:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000880)=[{0x10, 0x1}], 0x10}, 0x0) [ 513.967596] EXT4-fs (loop5): group descriptors corrupted! 14:58:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000007bc0)={0x18, 0x4, &(0x7f0000007980)=@framed={{}, [@call]}, &(0x7f0000007a00)='syzkaller\x00', 0x6, 0xed, &(0x7f0000007a40)=""/237, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:22 executing program 2: socketpair(0x23, 0x0, 0x4, &(0x7f00000002c0)) 14:58:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000005d80)={0x12, 0x2, 0x0, 0x4, 0x0, 0x1}, 0x40) 14:58:22 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {0x0}, {&(0x7f0000000180)="ac", 0x1}], 0x3, &(0x7f0000000780)=[@ip_tos_int={{0x14}}, @ip_tos_u8={{0x11}}], 0x30}, 0x50) [ 514.112672] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 514.134757] audit: type=1804 audit(1618844302.093:68): pid=29699 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir241309995/syzkaller.t7KTs4/402/memory.events" dev="sda1" ino=15507 res=1 [ 514.136718] EXT4-fs (loop5): group descriptors corrupted! 14:58:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002300)={0x11, 0x5, &(0x7f0000002100)=@framed={{}, [@map_val]}, &(0x7f0000000000)='GPL\x00', 0x5, 0xd7, &(0x7f0000002180)=""/215, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000200)=""/139, 0x2e, 0x8b, 0x1}, 0x20) 14:58:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000b000000000000060300000d"], &(0x7f0000000180)=""/214, 0x47, 0xd6, 0x1}, 0x20) [ 514.228394] audit: type=1804 audit(1618844302.193:69): pid=29723 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir241309995/syzkaller.t7KTs4/402/memory.events" dev="sda1" ino=15507 res=1 14:58:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 14:58:22 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001440)=[{0x0}, {&(0x7f0000000f00)="f1", 0x1}], 0x2}, 0x0) 14:58:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000026c0)={0x0, 0x2000000000000378, 0x0, &(0x7f0000002600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, 0x78) 14:58:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000180)=""/214, 0x1000000, 0xd6, 0x1}, 0x20) 14:58:22 executing program 2: bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x85) 14:58:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000000)=""/215, 0x47, 0xd6, 0x1}, 0xed) 14:58:22 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141442e6", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open$cgroup(0x0, r1, 0xd, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x1}, 0x4000, 0x0, 0x174a, 0x0, 0x101, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 14:58:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) 14:58:22 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000040), 0x52d) close(r0) [ 514.364347] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 514.392289] EXT4-fs (loop5): group descriptors corrupted! 14:58:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 14:58:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x5}]}}, &(0x7f0000000100)=""/217, 0x26, 0xd9, 0x1}, 0x20) 14:58:22 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) 14:58:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 14:58:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x200000000000004d, &(0x7f00000002c0)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:22 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) 14:58:22 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000004600)='./cgroup.net/syz0\x00', 0x200002, 0x0) 14:58:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x7, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x9}, {0x2}, {}]}, @restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000002c0)=""/176, 0x4f, 0xb0, 0x1}, 0x20) 14:58:22 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) [ 514.599021] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 514.633066] EXT4-fs (loop5): group descriptors corrupted! 14:58:22 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETTXFILTER(r0, 0x5450, 0x0) 14:58:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x17, 0x0, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x40) 14:58:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x9, 0x1}]}]}}, &(0x7f00000002c0)=""/176, 0x36, 0xb0, 0x1}, 0x20) 14:58:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000000c0)='4', 0x1}], 0x1}, 0x0) 14:58:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000b000000000000000300000d390e084dceb9a51ee72bf035b0168e1b5afc138d17d471f38cb495ed34"], &(0x7f0000000000)=""/224, 0x47, 0xe0, 0x1}, 0x20) 14:58:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff92b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:58:22 executing program 3: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 14:58:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000780)=[{0x0}, {&(0x7f00000002c0)='q', 0x1}, {&(0x7f0000000100)='S', 0x1}], 0x3}, 0x0) 14:58:22 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r0, 0x0, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 14:58:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000780)=[{0x0}, {&(0x7f00000002c0)='q', 0x1}], 0x2}, 0x0) [ 514.853217] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:22 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001140)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=[@mark={{0x14}}], 0x18}, 0x0) 14:58:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:22 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8946, &(0x7f0000000000)) 14:58:22 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:58:22 executing program 0: socketpair(0x2a, 0x0, 0x0, &(0x7f0000001940)) [ 514.917169] EXT4-fs (loop5): group descriptors corrupted! 14:58:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000100)=""/217, 0x26, 0xd9, 0x1}, 0x20) 14:58:23 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002580)={0x0, 0x0, 0x0, 0xf00, &(0x7f0000000380)=ANY=[], 0x21f0}, 0x0) 14:58:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000080)="8c247e", 0x3}, {&(0x7f00000000c0)="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", 0xebe}], 0x2}, 0x0) 14:58:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1098, 0x1}, 0x40) 14:58:23 executing program 3: clone(0x66b615a43fd2c724, 0x0, 0x0, 0x0, 0x0) 14:58:23 executing program 0: clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) select(0x40, &(0x7f0000000740), &(0x7f0000000780)={0x7ff}, 0x0, &(0x7f0000000840)={0x0, r0/1000+60000}) 14:58:23 executing program 2: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000001640)='./file0\x00', 0x80000010) [ 515.067352] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 515.100487] EXT4-fs (loop5): group descriptors corrupted! 14:58:23 executing program 1: r0 = getpgrp(0xffffffffffffffff) ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0) 14:58:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:23 executing program 3: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x80000010) 14:58:23 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, 0x0, 0x8, 0x0) 14:58:23 executing program 0: clone(0x10180000, &(0x7f0000001040), 0x0, 0x0, &(0x7f00000011c0)) 14:58:23 executing program 1: clone(0x41025180, &(0x7f0000000000), 0x0, 0x0, 0x0) 14:58:23 executing program 3: mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d76697274696f2c6163636573733dd7868b91ffca4dbe7032a9b3f09d9fa757f33338b4f02e68f54746e7ed0b9a0555fa19fe95cda9684abbf7", @ANYRESDEC=0x0, @ANYBLOB="2c64656275673d3078303030303030303030303030303030332c63616368657461673d2d2c616e616d653d577da02d2d272c6163636573733d", @ANYRESDEC, @ANYBLOB=',fowner>', @ANYRESDEC, @ANYBLOB=',smackfstransmute=,euid=', @ANYRESDEC=0xee00, @ANYBLOB=',seclabel,seclabel,audit']) 14:58:23 executing program 2: set_mempolicy(0x0, &(0x7f0000000000), 0x8) 14:58:23 executing program 4: r0 = fork() prlimit64(r0, 0x0, 0x0, 0x0) 14:58:23 executing program 0: setitimer(0x0, &(0x7f0000000000), &(0x7f0000000040)) [ 515.313228] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 515.347492] IPVS: ftp: loaded support on port[0] = 21 14:58:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=lower,uni_xlate=0,utf8=1,uni_xlate=0,dos1xfloppy,']) 14:58:23 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000280)='./cgroup.cpu/syz1\x00'], &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='veth0_vlan\x00'], 0x400) [ 515.361038] EXT4-fs (loop5): group descriptors corrupted! 14:58:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:23 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) 14:58:23 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:58:23 executing program 2: futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0) 14:58:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b36, 0x0) [ 515.565827] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:23 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x40086602, 0x0) 14:58:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000006a80)={0x0, 0x0}) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000006ac0)={0x0, r1+60000000}) 14:58:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) 14:58:23 executing program 0: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/ttyS3\x00', 0x40, 0x0) 14:58:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4d, 0x0) [ 515.619616] EXT4-fs (loop5): group descriptors corrupted! 14:58:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) 14:58:23 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x0, 0x0) openat(r0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) 14:58:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:58:23 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000780)='batadv\x00', 0xffffffffffffffff) socket$inet(0x2, 0xa, 0x0) 14:58:23 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000002600)=[{&(0x7f0000000100)="c6", 0x1}, {&(0x7f00000023c0)='\b', 0x1, 0x100000001}], 0x0, 0x0) 14:58:23 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000100)='3', 0x1, 0x73b9da79}, {&(0x7f0000000080)="17", 0x1}], 0x0, 0x0) 14:58:23 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:58:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b32, 0x0) [ 515.828683] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:58:23 executing program 1: openat(0xffffffffffffffff, 0x0, 0x400602, 0x0) 14:58:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b32, 0x0) 14:58:23 executing program 2: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) [ 515.912224] EXT4-fs (loop5): group descriptors corrupted! 14:58:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x7fffffff, 0x0, 0x0, "7523cfe13920dab67802e8c4e94936b871a8de"}) 14:58:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5603, 0x0) 14:58:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b32, 0x0) 14:58:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)='0', 0x1}], 0x1) 14:58:24 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="d7", 0x1}, {&(0x7f00000001c0)="72f6", 0x2, 0xffffffff}], 0x0, 0x0) 14:58:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b32, 0x0) 14:58:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x80045440, 0x0) 14:58:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000002800)='./file0\x00', 0x0, 0x0, 0x0, 0x80008, &(0x7f0000002a00)) 14:58:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x2, 0x0) 14:58:24 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x111500, 0x0) [ 516.134748] new mount options do not match the existing superblock, will be ignored [ 516.160477] new mount options do not match the existing superblock, will be ignored 14:58:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b2f, 0x0) 14:58:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:24 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00', r0) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) 14:58:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541c, 0x0) 14:58:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b66, 0x0) 14:58:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5402, 0x0) 14:58:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541d, 0x0) [ 516.259201] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 516.278043] EXT4-fs (loop5): group descriptors corrupted! 14:58:24 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f0000003d40)='./file0\x00', 0x0, 0x0) 14:58:24 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000003d40)='./file0\x00', 0x200000, 0x0) 14:58:24 executing program 3: pselect6(0x40, &(0x7f0000000180), &(0x7f00000002c0)={0x80}, 0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={[0x61b]}, 0x8}) 14:58:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0xc0045878, 0x0) 14:58:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000002600)=[{0x0, 0x0, 0x2}, {0x0, 0x0, 0x7fe5}], 0xe2827debc848a8bc, &(0x7f0000002700)={[{@uni_xlate='uni_xlate=1'}, {@uni_xlate='uni_xlate=1'}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@obj_type={'obj_type', 0x3d, '/dev/vcs\x00'}}, {@fowner_eq={'fowner'}}]}) 14:58:24 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f00000000c0)="5ed4f37264ed054914f8b3a6d0e0a067293af124f3893f5c59f2264d0cdfa5b2a8bfe657f49e4e96465f3fa226f9bc92033a2319b9ccf8db78290a206ffed8fc6060e3d6ae01eb47993cfce95b94da7aac07a8d643b3f820203084740ece5426f23d32411cb06244b9ee2b1f2e04d5", 0x6f, 0x3}, {&(0x7f0000000140)="53597d42d9c2faa2de20cd9a5dacd35a242121ab757d0f4c128a2d3bddb7e0e6aedd0ec4e576d122a1e16058fc", 0x2d, 0x2}, {&(0x7f00000001c0)="bb", 0x1}, {0x0, 0x0, 0xae5}], 0x20a1400, &(0x7f0000000680)={[{@shortname_winnt='shortname=winnt'}, {@numtail='nonumtail=0'}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@numtail='nonumtail=0'}, {@rodir='rodir'}, {@shortname_lower='shortname=lower'}, {@shortname_win95='shortname=win95'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<'}}]}) [ 516.476944] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 516.533854] EXT4-fs (loop5): group descriptors corrupted! 14:58:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:24 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000002600)=[{&(0x7f00000002c0)="e1", 0x1, 0x7fe5}], 0x0, 0x0) 14:58:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000003340)="193e5820ac1eed2501af0c59", 0xc) 14:58:24 executing program 1: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:58:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 14:58:24 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x20a1400, 0x0) 14:58:24 executing program 2: syz_genetlink_get_family_id$smc(&(0x7f0000000180)='SMC_PNETID\x00', 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) 14:58:24 executing program 0: unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x0) 14:58:24 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x12000, 0x0) 14:58:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000040)=ANY=[], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r3, 0x0) 14:58:24 executing program 0: renameat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, 0x0) 14:58:24 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) [ 516.744660] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 516.775797] EXT4-fs (loop5): group descriptors corrupted! 14:58:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:24 executing program 1: sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, 0x0, 0xc277fac8cf64fde8) 14:58:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=@getsadinfo={0x20, 0x23, 0x205, 0x0, 0x0, 0x0, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0x20}}, 0x0) 14:58:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5414, 0x0) [ 516.870641] audit: type=1804 audit(1618844304.833:70): pid=30090 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir831152200/syzkaller.O0lgZr/737/bus" dev="sda1" ino=15682 res=1 14:58:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5415, 0x0) 14:58:24 executing program 1: ustat(0x8, &(0x7f00000000c0)) 14:58:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5437, 0x0) 14:58:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b30, 0x0) 14:58:25 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000780)='batadv\x00', 0xffffffffffffffff) 14:58:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4bfa, 0x0) 14:58:25 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f00000000c0)='^', 0x1, 0x3}, {&(0x7f0000000140)='S', 0x1}, {&(0x7f00000001c0)="bb", 0x1, 0x3ff}, {&(0x7f00000002c0)="8d", 0x1}], 0x0, 0x0) [ 517.040677] audit: type=1804 audit(1618844304.893:71): pid=30099 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir831152200/syzkaller.O0lgZr/737/bus" dev="sda1" ino=15682 res=1 [ 517.064683] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:25 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x243, 0x0) 14:58:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:25 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000380), 0x0) 14:58:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00'}) 14:58:25 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x1, 0x0) 14:58:25 executing program 1: ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000000)={{}, 0x1, 0x7, 0x8000}) statx(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x100, 0x200, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x1000, 0x5, &(0x7f00000004c0)=[{&(0x7f00000000c0)="5ed4f37264ed054914f8b3a6d0e0a067293af124f3893f5c59f2264d0cdfa5b2a8bfe657f49e4e96465f3fa226f9bc92033a2319b9ccf8db78290a206ffed8fc6060e3d6ae01eb47993cfce95b94da7aac07a8d643b3f820203084740ece5426f23d32411cb06244b9ee2b1f2e04d5", 0x6f, 0x3}, {&(0x7f0000000140)="53597d42d9c2faa2de20cd9a5dacd35a242121ab757d0f4c128a2d3bddb7e0e6aedd0ec4e576d122a1e16058fc9d36f770549c00b09aec1fb5379c57547c63b66134f48d4a27165b81a04af077b8f6af4c1956bf5e6183c5e28b", 0x5a, 0x2}, {&(0x7f00000001c0)="bb5e0199fd08909f0bab1c9abd44eda83052cc4c9f7de365950223e4156945227bb854c6ec6d88d13bf8611d8d3ed5cc3db628244dabeff5cdecf72392053acd2ad6c7a3d1b75dae544358c78ad068d5a7120f8a4079ccc23862e07cea0c939ceebc246d3c3c5f8879100c27d3d11fe9579c0bb716e046a8a10ab86fc6eb81630ebf582c64302e83eaa964e5ae05fa3fa3dc8ab2b40d26583a1409d46cc6d8dfb28f763a91231dc4f1f22ef8df7dc31ee5f30cf625a4c433fa90639730f1bfebb62263d3cdf6983e09d811af7efdb5ed86edadd441ad6f9b54212b3c90c9a928b23f10af9c3eaf4d7e4ab3", 0xeb, 0x3ff}, {&(0x7f00000002c0)="8dc221b79f8751f9bc86c9cb51241a1846d473ceee4dc6d0957287a414f12179b529c31c7d64e3f34e6a04b0eb3860af268d8da9f6ec200baef2a223749dd92c424d8c138d9fe6494e1cdb1c1d6ba1d6f9b0fbb8c2054c318ac2534e3b2c0d82b997f7937cb7eeca0e8e557bcbba79743a8b3458a3da96f0c2b5c0e4daa1b24fabee6906d6939af951826ed3f68b4f7608a636b60675fe2bd4b4f1ca780773fffc45d096ac249a89d8374457989502d7be94b2d801f9fb61c80a156f2512cf18608bdfafc82b1548b2ac769e970ffd2d66237cc0945b743a4632dc0685f31e4d2f61d012eb1081e7f232f6d50eb77121e31001968d91546c", 0xf8, 0x81}, {&(0x7f00000003c0)="a114ec4dccb9f1ff6af35aed42e296f230a142853ae4fdcc17abeaecfd9a972893e6fefb2a2a7eb07c2164b3d8d6984ad8caa57cd560812a46db594debe8fa9c4643c4464e419c6f6454d61702e800439dcf2d5e7e169f40fd69f472dcc9025abe93867f08326d4ce8ad0fac3cc60a8b4a36023e9952ac0ffb3685cd980719f21df1c95bc7beab5a08d83c9c2f679fbd33bfa5ff38b02837264fac8a1fb09c22f89b04a3fe9991300f821ba13faa45b659f324d905ec255a410dec69a72043518b56eb3be176e56e5ca7032b497f0b54c01358c0d453e91ad195cd3ba2", 0xdd, 0xae5}], 0x20a1400, &(0x7f0000000680)={[{@shortname_winnt='shortname=winnt'}, {@numtail='nonumtail=0'}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@numtail='nonumtail=0'}, {@rodir='rodir'}, {@shortname_lower='shortname=lower'}, {@shortname_win95='shortname=win95'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<', r0}}]}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000780)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x80) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x44, 0xf, 0x6, 0x404, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xb5107ac85bddf7e5}, 0x20000000) r2 = socket$inet(0x2, 0xa, 0x6276) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f00000009c0)={0x7f8, [], 0x9, "897670bb66df97"}) [ 517.254089] audit: type=1804 audit(1618844304.953:72): pid=30099 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir831152200/syzkaller.O0lgZr/737/bus" dev="sda1" ino=15682 res=1 14:58:25 executing program 4: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x8c0) 14:58:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5609, 0x0) 14:58:25 executing program 3: syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00', 0xffffffffffffffff) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 14:58:25 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={0x0}) 14:58:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)) 14:58:25 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x0) 14:58:25 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x6800, 0x0) [ 517.318322] print_req_error: I/O error, dev loop4, sector 0 14:58:25 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, 0x0) 14:58:25 executing program 2: pselect6(0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000640), &(0x7f0000000680), &(0x7f0000000700)={&(0x7f00000006c0), 0x8}) 14:58:25 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x288000) [ 517.347931] audit: type=1804 audit(1618844304.953:73): pid=30099 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir831152200/syzkaller.O0lgZr/737/bus" dev="sda1" ino=15682 res=1 14:58:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, 0xf, 0x6, 0x801, 0x0, 0x0, {0x1, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) 14:58:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8020, &(0x7f0000001740)) 14:58:25 executing program 2: inotify_init1(0x2316bd5217c4158d) 14:58:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5427, 0x0) [ 517.359506] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 [ 517.635963] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe2827debc848a8bc, &(0x7f0000002700)) 14:58:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:26 executing program 3: syz_mount_image$vfat(&(0x7f0000001040)='vfat\x00', &(0x7f0000001080)='./file0\x00', 0x0, 0x0, &(0x7f0000002340), 0x0, &(0x7f00000023c0)={[], [{@subj_type={'subj_type'}}]}) 14:58:26 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[{&(0x7f00000000c0)='^', 0x1}], 0x0, 0x0) 14:58:26 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 14:58:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540c, 0x0) 14:58:26 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(r0, 0x0, 0x0) 14:58:26 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) 14:58:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=lower,uni_xlate=0,utf8=1,uni_xlate=0,dos1xflo']) 14:58:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b71, 0x0) 14:58:26 executing program 1: wait4(0x0, 0x0, 0x60000007, 0x0) [ 518.510647] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:26 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x40086602, &(0x7f0000000280)=ANY=[@ANYBLOB='>']) open(&(0x7f0000000000)='./bus\x00', 0x44080, 0x0) 14:58:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:26 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000180)='gtp\x00', r0) 14:58:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560e, 0x0) 14:58:26 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x500) 14:58:26 executing program 4: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x0) 14:58:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560f, 0x0) 14:58:26 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000001540)=[{&(0x7f0000000080)="f3", 0x1}, {&(0x7f0000000440)="8a836fc010fc8c2a3042170e8cd667e4eee209471c2dd7883a210a62ad2400faf9931093e2cd7e00ea8af92fc417e17e6b3e4b9dfe0d3007924213b4034b16367e02d4d9b9e14ef921cf76fd5207ceba97c84642e6f172de3928e6ed8722b71a5bb9e9472ca8e088e1769a1f8f32eca297eca0a7ba8cd4e9222d32027a47978115b6fa725d4079cd275ccab09b7bea2b36f9563512527ddeef1806317136b21ff2e09cea81bc51e7354c52bbb9f2a31a61e285899218ee23efd1c8aa29c86e5da93e914129a7d60b3ee3060a58d76e4591c8b2417c", 0xd5, 0xd4}], 0x0, 0x0) [ 518.735640] audit: type=1804 audit(1618844306.693:74): pid=30229 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir746965837/syzkaller.8FtLZn/797/bus" dev="sda1" ino=16017 res=1 [ 518.765891] audit: type=1800 audit(1618844306.693:75): pid=30229 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16017 res=0 14:58:26 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)={0x9}, 0x9) 14:58:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5608, 0x0) 14:58:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b40, 0x0) [ 518.803886] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:26 executing program 1: socket$inet(0x2, 0x0, 0x6276) 14:58:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:26 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0x4000, 0x0) 14:58:26 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000001540)=[{&(0x7f0000000080)="f3", 0x1}, {&(0x7f0000000440)="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", 0xf2d, 0xd4}], 0x0, 0x0) [ 518.899647] audit: type=1800 audit(1618844306.713:76): pid=30236 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16017 res=0 14:58:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000680)={[{@numtail='nonumtail=0'}, {@rodir='rodir'}]}) 14:58:26 executing program 1: r0 = socket(0x11, 0x2, 0x0) sendmmsg(r0, &(0x7f0000005340)=[{{&(0x7f0000000000)=@hci={0x1f, 0x0, 0x1}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000080)="1a8c7d82d11ad65b40925a01977264780757a52cc87de3a678517d24198be742f74b033cd6881ff51ac5ec45a0ba9aa823432c258266fcf6ab07670ccc608834ec63e4e3153b75e969b9f4da370f45a510cd54c3dcaeca9222d3cc89a20d8b5e48500c4775b463863e0c21423b84ba929dfcb7bca13fe161eb7377bc4cee3034621548c66fe47d947f6e76f6009a19a58330b97319f4f0b158b962249c1dcc9d9b9b4aef17de009643127beb5467ca94e8eacd9be7175da6984b7b35d24f6cf2bbbebcd63d40dbd01a52e3b6fb8257017a1d3dc7afeedd7e7bf31a69f87484d5572aed8bbb076615", 0xe8}, {&(0x7f0000000180)="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", 0xf27}, {0x0}, {&(0x7f00000011c0)='y', 0x1}], 0x4}}, {{&(0x7f0000001640)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, 0x0}}], 0x2, 0x0) 14:58:26 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$smc(&(0x7f0000001880)='SMC_PNETID\x00', r0) 14:58:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000002800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002a00)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) 14:58:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x280000, 0x0) 14:58:27 executing program 1: pselect6(0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000680), &(0x7f0000000700)={&(0x7f00000006c0)={[0x61b]}, 0x8}) [ 519.041949] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:27 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x22a) 14:58:27 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00', r0) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:58:27 executing program 2: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x77359400}, 0x8) 14:58:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', 0x0, 0x0, 0x1, &(0x7f00000004c0)=[{&(0x7f00000000c0)='^', 0x1}], 0x0, &(0x7f0000000680)) 14:58:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000006940)=[{{&(0x7f0000001300)=@in={0x2, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x2, 0x0) 14:58:27 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 14:58:27 executing program 1: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x40, 0x0) 14:58:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b35, 0x0) 14:58:27 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 14:58:27 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 14:58:27 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f00000024c0)='./file0\x00', 0x6000, 0x0) [ 519.308826] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:27 executing program 0: pselect6(0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000640), &(0x7f0000000680), &(0x7f0000000700)={&(0x7f00000006c0)={[0x61b]}, 0x8}) [ 519.475213] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541b, 0x0) 14:58:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:58:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x14}}, 0x0) 14:58:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560a, 0x0) 14:58:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000200)=@buf={0x28, &(0x7f0000000180)="d3c42f76fe99dec395cfd7f28a8ce92eb9934ed8b6ba7b76069ef93a3b9821b8f60f1d90db0cb4db"}) 14:58:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:28 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2, 0x0) 14:58:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5606, 0x0) 14:58:28 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x4081, 0x0) 14:58:28 executing program 4: statx(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x20a1400, 0x0) 14:58:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5422, 0x0) 14:58:28 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0xefbb82c19ef18223, 0x0) [ 520.254081] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c00000000000000", 0x10, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={0x0}}, 0x0) 14:58:28 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) 14:58:28 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000001540)=[{&(0x7f0000000080)="f3", 0x1}, {&(0x7f0000000440)="8a836fc010fc8c2a3042170e8cd667e4eee209471c2dd7883a210a62ad2400faf9931093e2cd7e00ea8af92fc417e17e6b3e4b9dfe0d3007924213b4034b16367e02d4d9b9e14ef921cf76fd5207ceba97c84642e6f172de3928e6ed8722b71a5bb9e9472ca8e088e1769a1f8f32eca297eca0a7ba8cd4e9222d32027a47978115b6fa725d4079cd275ccab09b7bea2b36f9563512527ddeef1806317136b21ff2e09cea81bc51e7354c52bbb9f2a31a61e285899218ee23efd1c8aa29c86e5da93e914129a7d60b3ee3060a58d76e4591c8b2417c73", 0xd6}], 0x0, 0x0) 14:58:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b49, 0x0) 14:58:28 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b63, 0x0) 14:58:28 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000002600)=[{0x0, 0x0, 0x100000001}], 0x0, 0x0) 14:58:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000002800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002a00)={[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, '('}}]}) 14:58:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540f, 0x0) [ 520.429535] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 520.429535] 14:58:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x40087602, 0x0) 14:58:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0x0, 0x3, &(0x7f0000002600)=[{&(0x7f0000000200)}, {&(0x7f0000000280)}, {&(0x7f00000002c0), 0x0, 0x7fe5}], 0xe2827debc848a8bc, &(0x7f0000002700)={[{@shortname_mixed='shortname=mixed'}, {@fat=@debug='debug'}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fowner_gt={'fowner>'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) 14:58:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x545d, 0x0) 14:58:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5413, 0x0) 14:58:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000006940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:58:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b6a, 0x0) 14:58:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x200, 0x0, 0x0, 0x0, 0x0, "fc250866dd91f6c8bac8ce83f53ab570700e63"}) 14:58:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5412, 0x0) [ 521.232088] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 521.232088] 14:58:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000200)=@buf) 14:58:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5451, 0x0) 14:58:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5460, 0x0) 14:58:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b3d, 0x0) [ 521.389154] print_req_error: I/O error, dev loop5, sector 0 [ 521.395182] print_req_error: I/O error, dev loop5, sector 0 [ 521.401494] Buffer I/O error on dev loop5, logical block 0, async page read 14:58:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x8}, {&(0x7f0000000480), 0x0, 0x3f}, {&(0x7f00000001c0)='r', 0x1, 0xffffffff}], 0x2100052, &(0x7f00000003c0)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c726f6c69722c636f52746578743d73746166665f752c6d61736b3d4d41595f524541442c00bfc4db1b76623147e1a20d1551092e9f270d040e95066ef5d7d23a303f95e0f6e96514cc3ede828ba193c91f581c9fb7e4c1c5c86be2f05268d05e6edcebdb9659b485f09f4c4514eccde08747fe08c19c38a875cc98cc08a44095cb65d5ff7a2578e8b6"]) 14:58:29 executing program 1: sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, 0x0, 0x0) 14:58:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4e, 0x0) [ 521.436259] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 [ 521.490950] print_req_error: I/O error, dev loop5, sector 24 [ 521.569467] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:30 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x400, 0x0) 14:58:30 executing program 1: open$dir(&(0x7f0000000040)='./file1\x00', 0x64e, 0x0) open$dir(&(0x7f00000000c0)='./file1\x00', 0x58, 0x0) 14:58:30 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000a80)={0x1c, 0x1c, 0x1}, 0x1c) 14:58:30 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000000), 0x20) 14:58:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000040), 0x4) 14:58:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5424, 0x0) 14:58:30 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) [ 522.235571] audit: type=1804 audit(1618844310.193:77): pid=30455 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir442284218/syzkaller.egc9qB/823/file1" dev="sda1" ino=16813 res=1 14:58:30 executing program 4: open$dir(&(0x7f0000000040)='./file1\x00', 0x64e, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0) 14:58:30 executing program 1: syz_emit_ethernet(0x178, &(0x7f0000000600)=ANY=[@ANYBLOB="15dda8810f85ffffffffffff88a811"], 0x0) 14:58:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f0000000100), 0x4) 14:58:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x42, &(0x7f0000000240)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) 14:58:30 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 522.323476] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/237, 0xed}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/66, 0x42}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xd051, 0x0, 0x0, 0x800e0053d) shutdown(r5, 0x0) r7 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r7, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0, 0x0) shutdown(r6, 0x0) shutdown(r3, 0x0) 14:58:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xcb}, 0xb) r1 = dup(r0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0xb) 14:58:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0xa, &(0x7f0000000240)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) 14:58:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x17, &(0x7f0000000240)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) 14:58:30 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000180), 0x10) 14:58:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, &(0x7f0000000080)='R', 0x1, 0x4004d, &(0x7f0000000000)=@in, 0x80) 14:58:30 executing program 0: syz_emit_ethernet(0x1db, &(0x7f0000000100)=ANY=[@ANYBLOB="bbbbbbbbbbbbe6bfc3fe8b3986dd6e58ce6401a50600fe8000000000000000000000000000aaff020000000000000000000000000001"], 0x0) 14:58:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x9, &(0x7f0000000240)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) 14:58:30 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) [ 522.579531] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x53, &(0x7f0000000240)={0x0, {{0x10, 0x17}}, {{0x10, 0x2}}}, 0x118) 14:58:30 executing program 4: open$dir(0x0, 0x4010e, 0x0) [ 522.820497] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x3}, 0xb) r1 = dup(r0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0xb) 14:58:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getpeername$inet(r0, 0x0, &(0x7f0000000080)) 14:58:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000480), &(0x7f0000000540)=0x98) 14:58:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) read(r0, &(0x7f0000000640)=""/69, 0x45) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x350, 0x0, 0x0, 0x800e004f7) shutdown(r1, 0x0) 14:58:31 executing program 4: open$dir(&(0x7f00000001c0)='./file1\x00', 0x240640, 0x0) 14:58:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:31 executing program 1: open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file1/file0\x00', 0x88200, 0x0) 14:58:31 executing program 4: open$dir(&(0x7f0000000040)='./file1\x00', 0x64e, 0x0) open$dir(&(0x7f0000000000)='./file1/file0\x00', 0x88200, 0x0) 14:58:31 executing program 2: open$dir(0x0, 0x9, 0x0) 14:58:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000080)='+', 0x1}], 0x1, &(0x7f00000004c0)=[@init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}, @authinfo={0x10}, @sndrcv={0x2c}, @authinfo={0x10}, @authinfo={0x10}, @dstaddrv6={0x1c, 0x84, 0xa, @empty}, @dstaddrv6={0x1c, 0x84, 0xa, @ipv4={[], [], @broadcast}}], 0xb8}, 0x0) 14:58:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c000000", 0xc, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 523.443728] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=[@sndinfo={0x1c}], 0x1c}, 0x0) 14:58:31 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$sock_int(r0, 0xffff, 0x2000, &(0x7f0000000000), 0x4) 14:58:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="1c1c4e2000"/125, @ANYRES32], 0x98) 14:58:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000140)=ANY=[@ANYBLOB="01"], &(0x7f00000002c0)=0x8) [ 523.645285] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 523.645285] 14:58:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x23, &(0x7f0000000000)=0x1c00, 0xfe6a) 14:58:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 14:58:32 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) getsockname(r0, 0x0, &(0x7f0000000080)) 14:58:32 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x98) 14:58:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x41, &(0x7f0000000240)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) 14:58:32 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="a9c3936d6ee888a2fff1dec76466cce89de782d2bef3928a50e1a8837889ff725a605aa7139b10ee8edae1428549a53ac722e62c67eb746d1739a7375040ab87fdc41f903e762c8a8b8b0a23e57e03066b343f1f2365e5732d90fc2716ef6f8a3de94b65c2243e662a4a201a8f908809dfef527a5ea60a4b974b66e1087dc2eb242ff47c2e9de07c04c51728833ffcbe", 0xffffff5a, 0x105, &(0x7f0000000000)={0xfffffffffffffea3, 0x1c, 0x2}, 0x1c) 14:58:32 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000000c0), &(0x7f0000000180)=0x98) 14:58:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:32 executing program 4: syz_emit_ethernet(0xba, &(0x7f00000001c0)={@local, @broadcast, @val, {@ipv6}}, 0x0) 14:58:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x7, &(0x7f0000000240)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) [ 524.416956] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 524.416956] 14:58:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x13, &(0x7f0000000240)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) 14:58:32 executing program 0: statfs(&(0x7f00000005c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) statfs(&(0x7f0000000200)='./file1/file0/file0\x00', 0x0) open$dir(&(0x7f0000000000)='./file1/file0\x00', 0x200, 0x0) 14:58:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@authinfo={0x10}], 0x10}, 0x0) 14:58:32 executing program 4: r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f0000001440)=ANY=[@ANYRESHEX], 0x3ef) 14:58:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)='+', 0x1}], 0x1, &(0x7f00000004c0)=[@authinfo={0x10}], 0x10}, 0x0) 14:58:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)=""/178, 0xb2}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/112, 0x70}], 0x1) shutdown(0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000000c0)=""/58, 0x3a}, {0x0, 0x2a}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x2) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r3, 0x0) r5 = socket(0x2, 0x5, 0x0) recvfrom$inet6(r5, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r4, 0x0) 14:58:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockname$inet(r0, 0x0, &(0x7f0000000100)) 14:58:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000100)=0x5, 0x4) 14:58:32 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000000), 0x1) 14:58:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x73}, 0xb) r1 = dup(r0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0xb) 14:58:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000040)=0x28c0, 0x4) syz_emit_ethernet(0x6e, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffbbbbbbbbbbbb86dd60d64d4d00383a00fc020000000000000000000000000000ff020000000000000000000000000001"], 0x0) 14:58:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="1c1c4e2000"/128, @ANYBLOB="00000000e6"], 0x98) [ 524.722744] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x20, 0x6, 0xfd, 0x4, 0x5, 0x20, 0x5, 0xcb, 0x73, 0x3}, 0xb) r1 = dup(r0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0xb) 14:58:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000000c0)=""/100, 0x62}], 0x1, 0x0, 0x31}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) readv(r2, &(0x7f0000000300)=[{&(0x7f0000005cc0)=""/102391, 0x18ff7}, {0x0}], 0x2) recvfrom$inet(r1, 0x0, 0xffffffd6, 0x0, 0x0, 0x800e00360) shutdown(r2, 0x0) shutdown(r1, 0x0) 14:58:32 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 14:58:32 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0xffffffff, 0x5}, 0x10) [ 524.921794] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:33 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x4, 0x4) 14:58:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f00000001c0)=ANY=[], &(0x7f00000002c0)=0x8) 14:58:33 executing program 2: unlinkat(0xffffffffffffffff, 0x0, 0x1000) 14:58:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x1}, 0x8) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 14:58:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:33 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = dup(r0) connect(r1, &(0x7f0000000200)=@in6={0x1c, 0x1c}, 0x1c) 14:58:33 executing program 1: pselect6(0x40, &(0x7f0000000180), &(0x7f00000002c0)={0x80}, 0x0, 0x0, 0x0) 14:58:33 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001540)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRES64], 0xa8}, 0x0) 14:58:33 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1000, 0xffffffff, 0x5}, 0x10) [ 525.651060] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001280)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@sndinfo={0x1c}], 0x1c}, 0x0) 14:58:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x18, &(0x7f0000000240)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) 14:58:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 14:58:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c00", 0xa, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:33 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001540)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[], 0xa8}, 0x0) 14:58:33 executing program 0: syz_emit_ethernet(0x178, &(0x7f0000000600)=ANY=[], 0x0) 14:58:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 14:58:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x1, 0x1, '\\'}, 0x9) 14:58:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002380)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000002300)=[@sndrcv={0x2c}], 0x2c}, 0x0) 14:58:34 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f0000000000)='<', 0x1, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 14:58:34 executing program 4: epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000080), 0x4) [ 525.951617] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 525.951617] 14:58:34 executing program 1: socketpair(0x2, 0xb, 0x0, &(0x7f0000000200)) 14:58:34 executing program 0: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000380)) 14:58:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') getpriority(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000100)=0xfffffff7, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x4000) 14:58:34 executing program 4: r0 = openat$vsock(0xffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, 0x0) [ 526.196057] Unknown ioctl 35084 14:58:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:34 executing program 2: syz_open_procfs$userns(0x0, &(0x7f0000000640)='ns/user\x00') 14:58:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 14:58:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000740), &(0x7f0000000780)=0x4) 14:58:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x36, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) 14:58:34 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x201, &(0x7f0000000100)={0x0}) [ 526.745724] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 526.745724] 14:58:34 executing program 1: r0 = openat$procfs(0xffffff9c, &(0x7f0000001080)='/proc/timer_list\x00', 0x0, 0x0) r1 = epoll_create(0x400) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x10000002}) 14:58:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006400)={0x0, 0x0, &(0x7f00000063c0)={&(0x7f0000002e00)=@newtfilter={0x23, 0x2c, 0x2529}, 0x24}}, 0x0) 14:58:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f0000000040)) 14:58:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000140)=0x1c) 14:58:34 executing program 2: r0 = openat$vsock(0xffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x5451) 14:58:34 executing program 1: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000380)={0x3}) 14:58:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:35 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() sched_setparam(r0, &(0x7f0000000300)=0x64) 14:58:35 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000180)) [ 526.993765] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:35 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) [ 527.176514] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:35 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000180)) timer_getoverrun(0x0) 14:58:35 executing program 2: getpid() mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid'}}], [], 0x6b}}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x800000080004103) 14:58:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="4c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000b00010067726574617000001400020008000100", @ANYRES32=r3, @ANYBLOB="08000700ffffffff08000a00", @ANYRES32=r3], 0x4c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000700)=@delchain={0x2c, 0x65, 0x100, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xf}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008050}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x7400, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x455, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) 14:58:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newroute={0x44, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x5}, [@RTA_IIF={0x8}, @RTA_MARK={0x8}, @RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @private2}}]}, 0x44}}, 0x0) 14:58:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000400)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000380)=ANY=[@ANYBLOB='<\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="000000000000000000001500000014000380080001000000000008000200000000001400078008000200000000000800020004"], 0x3c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000ee46000000000000ff00", @ANYRES32=r5, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c000200080001"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000100005ff000000000008001f00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r5], 0x50}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8, 0x14341}}, 0x20}}, 0x0) 14:58:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4bfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x27, 0x303, &(0x7f0000000040)="b90803600e00f000009e0ff008001fffffe10e194000632f77fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) 14:58:35 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') preadv(r0, 0x0, 0x0, 0x0, 0x0) 14:58:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:35 executing program 4: sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000011c0)={&(0x7f0000000040)={0x1158, 0x14, 0x300, 0x70bd28, 0x25dfdbff, {0x2b, 0x9}, [@INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x46, 0x1, "af441d4f9f96385aa53ee555abc66d7413a3681de2dfd7619531e1bcaebe8620f03f5db1e9b4866ca1df7238480e2a822e0269b1c9f7e2b75e8909565cbe0e269958"}, @INET_DIAG_REQ_BYTECODE={0xf5, 0x1, "cd81a57e3fe14e26ccacec305f693c4621699716d40706cb55a1791f7587b8dc4e943541c9589aee284f7ed9af1954dd08813ddf87efb55a02f46d0ee501e6a352b6dffeb4791dbd4ca5d487a151be4dd85fca66d87eeb2ac4dc8d4e4375b531d4a3be9a4f1c9624a632872c9f56184294d8f19c5415f8d9e3a759cdb8e26de76c585b7649e5a922b8f49d41468552264bfe600de1a639d630eb6660e8ef8eadc32f6d86d6690993dc26c3c5c9dc7374aded79fb21411347bbf70547867b5cc102db02f16bf5dacd58ff34185c365090a61b2f59c15aad1039340046b2dfe080b989e105e1325bbfab21668280b26e459c"}]}, 0x1158}, 0x1, 0x0, 0x0, 0x4000001}, 0x2004800c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=@gettaction={0xd4, 0x32, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x46be}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0xdd89}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xece7ee0}}]}, @action_gd=@TCA_ACT_TAB={0x28, 0x1, [{0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffff9}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb2}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001440)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000014c0)={&(0x7f0000001480)={0x28, r0, 0x2, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x26}}}}, [@NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x7}]}, 0x28}, 0x1, 0x0, 0x0, 0x8890}, 0x80) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001680)={&(0x7f0000001580)={0x100, r0, 0x400, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1000}}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x21a}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x72}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3a}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x212}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8}], @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2ec}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x9}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x24a}], @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1450}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x28}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x24b}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8001}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x3ff}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}]]}, 0x100}, 0x1, 0x0, 0x0, 0x20000000}, 0x5) syz_genetlink_get_family_id$tipc2(&(0x7f0000001700)='TIPCv2\x00', 0xffffffffffffffff) r1 = syz_mount_image$fuse(&(0x7f0000001740)='fuse\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0x0, 0x1004, &(0x7f00000017c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1c00}}], [{@obj_type={'obj_type', 0x3d, 'skbmod\x00'}}]}}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001940)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001a00)={&(0x7f0000001980)={0x68, r2, 0x4, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x3f}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x2a}, @NL80211_ATTR_STATUS_CODE={0x6}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x5a}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0xd}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0xc800) syz_genetlink_get_family_id$tipc(&(0x7f0000001a80)='TIPC\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000001ac0)='IPVS\x00', 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001b40)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000001c40)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001b80)={0x68, r3, 0x10, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x68}, 0x1, 0x0, 0x0, 0x44000}, 0x24048091) r4 = openat$dir(0xffffff9c, &(0x7f0000001c80)='./file0\x00', 0x2040, 0x104) renameat(r4, &(0x7f0000001cc0)='./file0\x00', r1, &(0x7f0000001d00)='./file0\x00') r5 = syz_mount_image$tmpfs(&(0x7f0000001d40)='tmpfs\x00', &(0x7f0000001d80)='./file0\x00', 0x9, 0x7, &(0x7f0000002140)=[{&(0x7f0000001dc0), 0x0, 0x5}, {&(0x7f0000001e00)="23744bb0c9560b1934abd77d4a94e50ee868511d41ec0d19bad98a1cc7d17017847775c73825a9cb7adc426f1f00d4f35ee4f6dddbde2b8728e4f58165b800a57171d8080573ab0ceffb52b34d14775d9b669c47688ea2d8e955c0c69451b7f3111aaf8810a20b650599ae6a376b13b1a278a396a635026cb7e7b37a08262f05213fb8f790f6ed78513a15ea28b2a44b726e87621d2aa0f1d340767328ad89b7b74222a8327f7326ac4dad9cff6df8e71d2dc3589c94b855ff8e017b5b50f715e49d5e0db3f2fa61ab721762885c55380b25aeb8a2414e11d1bdb63aef76140734b43aad2a698e085ace1e678605b0da27a71f", 0xf3, 0x20}, {&(0x7f0000001f00)="b4c98e670cd4a77c9d9438438fef47d04cb1e5fd423c3ecf593701d2661ed4452a9647", 0x23, 0xffffffff}, {&(0x7f0000001f40)="5dc0bb54ca91e72fb6b0cf116d746eaac68e89307f7fc4f3e3e11e72", 0x1c, 0x1}, {&(0x7f0000001f80)="c764bcc4756c99d78d2296c8a2421faacdd705bc5f64f37e445811fecdc72c8c24f4f85a5cd507bb4aac6cf24707f5676da11869dd8961ef1bac2554af5f6b332a1a668a0cdce7c250c2c043798be37356637212a60bbd900ee2c31d87c9610d2d925f14132f4b82e9", 0x69, 0x40}, {&(0x7f0000002000)="38874f9f94e7ebf3140811780e6d0eeb495e0e40fe360f3d5c16f38458bd8818344b2e10df427d7b88b0dc8b5e0a8a298936c4d28d21101c60cbe3752d5aae4f0ff6c283527d0c9539af642bf99f2dd613f0462ba6c13afc96ee0a5ba9f28b84df4ba34d1a6f7d2878dcd2e1e0ee707053080c2293ab76c980ca38b8ea5ee2912ecadf2624211ab42d48b7e45fea9051931a3857574cdc6526fd7e878b966c4221afe8e9b84aa1e42eaffc4d1a9df562bc13a5c8b610c031662ab8a6514853f6640fded34bcef36f55376c24496486", 0xcf, 0x2}, {&(0x7f0000002100)="caf9d7ac7d9354ec99e21a0bfb7eb4efc7c46dcc3375de97c16bdacfae0da705f99c859c07dd8a27a27f4a53252eded4928c9cdd29709aa7a79ce3ea29c8", 0x3e, 0x5}], 0x400400, &(0x7f00000021c0)={[{@huge_never='huge=never'}, {@uid={'uid', 0x3d, 0xee00}}, {@huge_never='huge=never'}, {@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x6d, 0x78, 0x32]}}, {@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x30]}}}}], [{@fsname={'fsname', 0x3d, 'blksize'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) clock_gettime(0x0, &(0x7f0000002280)={0x0, 0x0}) futimesat(r5, &(0x7f0000002240)='./file0\x00', &(0x7f00000022c0)={{r6, r7/1000+10000}, {0x77359400}}) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002300)='cpuacct.usage_user\x00', 0x0, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r8, &(0x7f0000003a80)={&(0x7f0000002340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000003a40)={&(0x7f0000002380)={0x169c, r0, 0x300, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_IE={0x240, 0x2a, [@random_vendor={0xdd, 0xb3, "cf5be31d281ef1242787a3d8e601161b2160c78baa700495120e7622c782887961a513e5dd93c68fa35d3c68dd00fefaae7ae4063369eea9e0f2742f0f0f974cfc1c5155a79078955642125e8c100f5320ac6ec6283a33a28cec5e0a9b52643369ae1c9ad9a6292dea2881fe7fe4e41ed70848bf05c1738bb75dd7b376a4df2b2c56a4dcbf272b671149b88648a5604ba1f0a6584e638b7b2ea52424c6a343e62a2f64924cc6703989dec7cbb36772b5a05499"}, @link_id={0x65, 0x12, {@from_mac=@broadcast}}, @challenge={0x10, 0x1, 0x74}, @tim={0x5, 0x3f, {0x5, 0x97, 0x6e, "360c784f9a6f52160b992244671d492dcae26c5d36ab3cff526185a1f4de058c4404521b6ccb5b64cb34c059b34a2526cdcd39d0805fa8c536605ae0"}}, @random={0x8, 0x42, "f60a91d11b93b692974188d8f7ec003b72d7443741afbcbaeab0bd126ab095e45de53fcc78206bc046f5bd589a2c8d9723e3685f72048f7930dff726410d895d2af0"}, @gcr_ga={0xbd, 0x6, @device_b}, @prep={0x83, 0x25, @ext={{}, 0xa, 0x9, @device_b, 0x1, @broadcast, 0x8dc, 0x8001, @device_a, 0x10c}}, @chsw_timing={0x68, 0x4, {0x6, 0x9}}, @tim={0x5, 0xb4, {0x9, 0xc0, 0x9, "2742aac1cd80cd0eccafafe571f54e0e1c6b63a8dcd70d5c47f07c7dcd60d7d4655394af68573347d6707b935d2b61c9df9d1ca7ab1815362036e12ef2a6bf786c216a14f36f18ddcc5af7a80a50220036fcedbc246d211cbba1e9eaf2f5d2f01ef369fb794e91402f3f28dc1f09b0814266c777f9263742da42bbdbc09566dfa66326a762477b11e7785675d177efd817683180120713c4bc2c7a4aa1430071e3d909a3822977e08599ac744877bf19df"}}]}, @NL80211_ATTR_IE={0x1a1, 0x2a, [@random_vendor={0xdd, 0xba, "8891f6b4a1b883d00c4224a57f8ab8a0b89bdf6314f82a6fe447becd5a5c8fa2821471481dd1384576d734e6b7a86864aa27b97763e63eb166bef7403451691be04e6150fc2369369a3662cf3bea522983bb5b9ffe1fe032ddfc2501ea7c2a6788550f9edf778f1aea488dfbaf16a506f63ef1581735ab19ca398f938389ebb32fa3bfc43cab8166e6c107f6b906dc798545ba6ed5659d90e70e58da9948415fa6be1843d901c701af542fd90d75b54e4481809bcc048e4c9cc8"}, @preq={0x82, 0x2b, @ext={{0x1}, 0x9, 0x0, 0x5, @device_b, 0x80, @device_a, 0x3, 0x91ef, 0x1, [{{0x1, 0x0, 0x1}, @device_a, 0x7}]}}, @sec_chan_ofs={0x3e, 0x1}, @mesh_chsw={0x76, 0x6, {0x4, 0x0, 0x18}}, @measure_req={0x26, 0x9f, {0x40, 0x6, 0x0, "d1215ce48330a49f94d1523fcf5bf8dbe4a2f60cbb92ccf675e18516e7ff6c203ed8def3561a239db0dc206fc89130f449aa4424938dbf50f97d0450bd45534b3ca46731f5db7ea720ab1241d0849abd0f6551d651bb7f0d8d63d1c4c1e422998d5a79bd70c3ab48c2a99cea49a01b15b8a7b962dc46da1c615da082b7edeffca74752b58f26e866f7f04518b46751f56c2baa8c2c3c36556632cb11"}}, @gcr_ga={0xbd, 0x6, @device_b}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_IE={0x1295, 0x2a, [@sec_chan_ofs={0x3e, 0x1}, @random={0x40, 0x4c, "686bc46f0e009956c6e7d64baef84df8a0f0c59c9058220938dba18124394f9bfd75a9d76546f64b1eb3988d8d78621504db4b968860b1d786c5013235031a66b0ea63e1efaa8e47e80da02c"}, @random={0x5, 0xa8, "bc0502a26eec96f561cb0f1bf482d0cddcb4ed457935337251902155cd8da7184b4e35dd97efbc99ea23386d16236a4ab3c456ec69c9121777f1b118e3b3d13e7dbb21ec25fe50370d4aa3c0838aee56d203863d86bc0963e871388a8a3b24cb604bf31971fda5141464a2f8fd3a45c3854c52dd1c3118312c46e418fc22b50ccf2f844477b67aa212ce804654b794dee11056733787db52db5c5d70bd69f98d1b4a225c8b98a2be"}, @ht={0x2d, 0x1a, {0x40, 0x3, 0x4, 0x0, {0x6, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x300, 0x401, 0x20}}, @peer_mgmt={0x75, 0x16, {0x1, 0x5, @void, @val=0x3d, @val="52eca2417a830a197022d3542f5a12d6"}}, @cf={0x4, 0x6, {0x81, 0xa2, 0x4, 0xc9}}, @measure_req={0x26, 0x1003, {0x5, 0x0, 0x20, "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"}}, @ht={0x2d, 0x1a, {0x2, 0x3, 0x0, 0x0, {0x3, 0x1, 0x0, 0xd, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x6, 0x6c06, 0x56}}, @mesh_id={0x72, 0x6}, @perr={0x84, 0x12f, {0x3f, 0x13, [@ext={{}, @device_a, 0x7, @device_a, 0x25}, @ext={{}, @device_b, 0x480000, @device_a, 0x13}, @not_ext={{}, @broadcast, 0xfffffff9, "", 0x21}, @not_ext={{}, @device_b, 0x80, "", 0x1f}, @ext={{}, @device_a, 0x400, @device_a, 0x27}, @ext={{}, @device_b, 0x8000, @device_a, 0x1a}, @not_ext={{}, @device_b, 0x7fff, "", 0x27}, @not_ext={{}, @broadcast, 0x10000, "", 0xd}, @ext={{}, @device_a, 0x1, @broadcast, 0x3c}, @not_ext={{}, @broadcast, 0x5, "", 0x2}, @not_ext={{}, @broadcast, 0x6, "", 0x3d}, @ext={{}, @broadcast, 0x4, @device_a, 0x18}, @ext={{}, @broadcast, 0x725a, @device_b, 0x38}, @not_ext={{}, @device_b, 0x9, "", 0x35}, @not_ext={{}, @broadcast, 0xa4f5, "", 0x17}, @ext={{}, @device_a, 0x1, @broadcast, 0x2d}, @not_ext={{}, @broadcast, 0x5, "", 0x22}, @ext={{}, @device_b, 0x2, @device_a, 0x26}, @not_ext={{}, @broadcast, 0x0, "", 0x35}]}}]}]}, 0x169c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000840) 14:58:35 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x0, 0x0) io_setup(0x3, &(0x7f0000000580)=0x0) io_submit(r1, 0x1, &(0x7f0000001240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 14:58:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8993, &(0x7f0000000940)={'wpan4\x00'}) [ 527.400222] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 [ 527.439082] print_req_error: I/O error, dev loop5, sector 24 [ 527.541799] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 527.541799] [ 527.796408] bond2: Enslaving gretap1 as a backup interface with an up link [ 527.825125] bond2: Enslaving veth5 as a backup interface with a down link 14:58:36 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyprintk\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [], 0xa, "be32cea46ca12a24c8f2c90b47241e4f50ac8282145b62a2ebcf16bee8b8951ccd7f4eeb51149a5264caf823a06fabad70e58861453048e038094f530d"}, 0x48) [ 527.889013] bond2 (unregistering): Releasing backup interface gretap1 [ 527.945083] bond2 (unregistering): Released all slaves [ 528.270917] device bond2 entered promiscuous mode [ 528.286059] device veth5 entered promiscuous mode [ 528.286465] IPv6: ADDRCONF(NETDEV_UP): bond2: link is not ready 14:58:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000780)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x140, 0x320, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x1}) [ 528.286478] 8021q: adding VLAN 0 to HW filter on device bond2 [ 528.326047] [U] #! ./file0 [ 528.326076] [U] ¾2Τl¡*$ÈòÉ G$OP¬‚‚[b¢ëϾ踕ÍNëQšRdÊø# o«­påˆaE0Hà8 OS [ 528.335730] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 528.335730] 14:58:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendmmsg(r2, &(0x7f0000004380)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="f1", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)='2', 0x1}, {0x0}], 0x2}}], 0x2, 0xa040) 14:58:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000100)={0x14}, 0x14) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f00002ce000/0x18000)=nil, &(0x7f00000002c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:58:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="4c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000b00010067726574617000001400020008000100", @ANYRES32=r3, @ANYBLOB="08000700ffffffff08000a00", @ANYRES32=r3], 0x4c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000700)=@delchain={0x2c, 0x65, 0x100, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xf}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008050}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x7400, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x455, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) 14:58:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:36 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x0, 0x0) io_setup(0x3, &(0x7f0000000580)=0x0) io_submit(r1, 0x1, &(0x7f0000001240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 14:58:36 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) connect$can_bcm(r0, &(0x7f0000000000), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x400000, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 14:58:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 528.429123] print_req_error: I/O error, dev loop5, sector 0 [ 528.449521] device veth7 entered promiscuous mode [ 528.450020] bond2: Enslaving veth7 as a backup interface with a down link [ 528.506163] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 [ 528.534934] print_req_error: I/O error, dev loop5, sector 24 [ 528.585421] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 [ 528.712778] print_req_error: I/O error, dev loop5, sector 0 14:58:36 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x0, 0x0) io_setup(0x3, &(0x7f0000000580)=0x0) io_submit(r1, 0x1, &(0x7f0000001240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 528.729894] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 528.760845] bond3: Enslaving gretap3 as a backup interface with an up link [ 528.834525] bond3 (unregistering): Releasing backup interface gretap3 14:58:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x2f5530}], 0x8, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x0, 0x3f00}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x7c, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 528.884108] bond3 (unregistering): Released all slaves 14:58:37 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x0, 0x0) io_setup(0x3, &(0x7f0000000580)=0x0) io_submit(r1, 0x1, &(0x7f0000001240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 529.074874] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 529.242734] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="4c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000b00010067726574617000001400020008000100", @ANYRES32=r3, @ANYBLOB="08000700ffffffff08000a00", @ANYRES32=r3], 0x4c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000700)=@delchain={0x2c, 0x65, 0x100, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xf}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008050}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x7400, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x455, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) 14:58:37 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000024c0)=[{&(0x7f0000000300)="ee", 0x1, 0x9}, {0x0}, {&(0x7f00000014c0)="1423", 0x2, 0xffffffff}], 0x0, 0x0) pivot_root(0x0, 0x0) 14:58:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001540)={[{@filestreams='filestreams'}]}) 14:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x54, r1, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x82639913f0df88d9}}, {0x8}, {0x6}, {0x8}}]}, 0x54}}, 0x0) 14:58:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) accept4(r0, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x0, 0x0) 14:58:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000003c0)='NLBL_MGMT\x00', r0) [ 529.511777] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 529.563034] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 529.631130] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 529.662825] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 529.662825] [ 529.690256] bond3: Enslaving gretap4 as a backup interface with an up link [ 529.753221] bond3 (unregistering): Releasing backup interface gretap4 [ 529.792133] bond3 (unregistering): Released all slaves 14:58:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000280)={0x80, 0x0, 0x0, 0x0, 0x0, "8b900f4485603b364b483b6f3cab5b8c6cd49c"}) 14:58:37 executing program 1: socket(0x40000000015, 0x5, 0x0) r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x2715, 0x0, &(0x7f0000000000)) 14:58:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) accept$unix(r0, 0x0, 0x0) 14:58:37 executing program 4: unshare(0x40000) 14:58:38 executing program 3: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000999000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x6000) shmat(0x0, &(0x7f0000800000/0x800000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) 14:58:38 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f0000000100)="48b809000000000000000f23d80f21f835c00000c00f23f8d29efc000000c463d90dfed23e64f30f1ae836f01048bd66410f38026ae2b9800000c00f3235000100000f3044ddb382522312c7442400d3000000c7442402db000000c7442406000000000f011c24c74424008c000000c7442402122001bcff1c24", 0x7a}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f00002ce000/0x18000)=nil, &(0x7f00000002c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:58:38 executing program 0: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff7f, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000010008108040f80ecdb4cb9460a480e0013000000e3060000000000000600140040fe00ff050003001201", 0x2e}], 0x1}, 0x0) getpid() 14:58:38 executing program 4: syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@link_local, @multicast, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local, {[@lsrr={0x83, 0x3}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 14:58:38 executing program 1: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x31e) close(r0) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000700)=[&(0x7f0000000600)='security.capability\x00', &(0x7f00000006c0)='security.capability\x00']) 14:58:38 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "e139c3", 0x48, 0x11, 0x0, @remote, @local, {[], {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "925141d79c195f4e3dbda928b63590620d9aa5e9a81788da", "4d6679ac29e39cce7c1bc6571b6bc055dc5b16dde01814d9a6de18cf532d17b8"}}}}}}}, 0x0) 14:58:38 executing program 4: bpf$MAP_CREATE(0x1700000000000000, &(0x7f0000000080)={0x17, 0x0, 0x1, 0x9}, 0x40) [ 530.068530] : renamed from caif0 [ 530.089552] A link change request failed with some changes committed already. Interface  may have been left with an inconsistent configuration, please check. [ 530.488353] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 530.488353] 14:58:38 executing program 4: syz_emit_ethernet(0x37, &(0x7f00000001c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "7923a3", 0x1, 0x33, 0x0, @local, @ipv4={[], [], @remote}, {[], "f4"}}}}}, 0x0) 14:58:38 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@ldst], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:38 executing program 0: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 14:58:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:38 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') 14:58:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2ec}) [ 530.729598] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 [ 530.782459] print_req_error: I/O error, dev loop5, sector 24 14:58:38 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/key-users\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') 14:58:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) 14:58:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) 14:58:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x34, r1, 0x209, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x34}}, 0x0) 14:58:38 executing program 1: syz_emit_ethernet(0x4e, &(0x7f00000000c0)={@local, @multicast, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1c91bf", 0x14, 0x6, 0x0, @private1, @private1, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:58:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:39 executing program 3: r0 = socket(0x2, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="ff", 0x1}], 0x1, 0x0, 0x0, 0x8880}], 0x492492492492591, 0x0) 14:58:39 executing program 1: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@buf) 14:58:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@ipv4_deladdr={0x18, 0x15, 0x1}, 0x18}}, 0x0) 14:58:39 executing program 2: syz_emit_ethernet(0x52, &(0x7f0000000000)={@link_local, @multicast, @val={@void}, {@ipv4={0x800, @generic={{0x10, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty, {[@cipso={0x86, 0x29, 0x0, [{0x0, 0xe, "c3a4acba321f873e0d64fccc"}, {0x0, 0x4, "e8d3"}, {0x0, 0x11, "0c431b1934857efd90b8711f0b1d6a"}]}]}}}}}}, 0x0) 14:58:39 executing program 3: syz_emit_ethernet(0x74, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd60010000003e0000fe8000000000000000000000000000aa000000000000000000000000006c"], 0x0) [ 531.043319] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:39 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000000280)=@framed={{}, [@exit, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @func, @exit, @func, @map, @initr0, @exit, @generic]}, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340), 0x8, 0x10, &(0x7f0000000380), 0x10}, 0x19) 14:58:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:39 executing program 1: rt_sigaction(0xa, 0x0, 0x0, 0x8, &(0x7f0000000180)) 14:58:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f00000002c0)) 14:58:39 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000340)={@local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "5be5ed", 0x30, 0x3a, 0x0, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "a7abec", 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev}}}}}}}, 0x0) 14:58:39 executing program 2: r0 = socket(0x2, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="ff50", 0x2}], 0x1}], 0x1, 0x0) 14:58:39 executing program 0: r0 = socket(0xa, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000000)='M', 0x1}], 0x1}], 0x1, 0x4040810) 14:58:39 executing program 1: r0 = socket(0xa, 0x3, 0x5) read$FUSE(r0, &(0x7f00000017c0)={0x2020}, 0x2020) 14:58:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:39 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan1\x00') [ 531.177177] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:39 executing program 4: r0 = socket(0xa, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000007240)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}, @rights={{0x10}}], 0x30}], 0x1, 0x0) 14:58:39 executing program 0: clock_adjtime(0x0, &(0x7f0000000100)) 14:58:39 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb8100000086dd600da9b30014060020"], 0x0) 14:58:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@multicast, @dev, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x2, 0x0, 0x6, 0x0, @rand_addr, @private}, @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}, 0x0) 14:58:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:39 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "e47788", 0x18, 0x0, 0x0, @dev, @ipv4={[], [], @private}, {[@srh={0x29, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@private2]}]}}}}}, 0x0) 14:58:39 executing program 4: capset(&(0x7f0000000300)={0x20080522}, &(0x7f0000000340)) capset(&(0x7f0000000200)={0x20080522}, &(0x7f00000003c0)) 14:58:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @multicast2}}, 0x20) [ 531.306813] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@dontfrag={{0x14}}, @hoplimit_2292={{0x14}}, @rthdrdstopts={{0x18}}], 0x48}, 0x24048000) [ 531.435582] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 [ 531.488187] print_req_error: I/O error, dev loop5, sector 24 14:58:40 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000004f40)={0x77359400}) 14:58:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x80) 14:58:40 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/user\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 14:58:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@remote, @in6=@local}}, {{@in6=@private1}, 0x0, @in=@multicast2}}, 0xe8) 14:58:40 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000002f00)={0x0, 0x0, 0x0}, 0x0) 14:58:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:40 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) read$alg(r0, &(0x7f0000000080)=""/48, 0x30) 14:58:40 executing program 0: capset(&(0x7f0000000300)={0x20080522}, &(0x7f0000000340)) capset(&(0x7f0000000200)={0x20080522}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) 14:58:40 executing program 4: r0 = socket(0x2, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0}], 0x1, 0x4040810) 14:58:40 executing program 1: syz_emit_ethernet(0xde, &(0x7f0000000000)={@local, @local, @val={@void}, {@ipv6={0x86dd, @udp={0x0, 0x6, "cd6449", 0xa4, 0x11, 0x0, @private2, @local, {[@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8001}], {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "3d4e3e7037a9f11f0ed727b1f6dd8b6400cb7abd84e1f7bd0d901462a776fc7e", "69564581b7da8d763835761ab56645d992ee5ec163aea40a360030908deeeb0b78c70a870506e1f8ef56478b5672b1c2", "430d8d582007f489a1a7c68bf491ed9f0ac82337fa10155d822d184d", {"d3d9aac233e84e271d7bc880f8cf882d", "1eaa90e6ad7f00acaa7b605c184305bd"}}}}}}}}, 0x0) 14:58:40 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000080)={@link_local, @multicast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @dev, @multicast1}}}}}, 0x0) 14:58:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_delroute={0x1c, 0x19, 0x40b, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda710b83904a8b33}}, 0x1c}}, 0x0) [ 532.156001] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:40 executing program 2: clock_getres(0x0, &(0x7f0000000fc0)) 14:58:40 executing program 0: syz_emit_ethernet(0x4e, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100c20000bbbb218100000086dd60"], 0x0) 14:58:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000002bc0)) 14:58:40 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 14:58:40 executing program 4: epoll_create(0x0) syz_genetlink_get_family_id$smc(&(0x7f00000004c0)='SMC_PNETID\x00', 0xffffffffffffffff) 14:58:40 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 14:58:40 executing program 0: r0 = socket(0xa, 0x3, 0x5) recvfrom$unix(r0, 0x0, 0x0, 0x42, 0x0, 0x0) 14:58:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x597d}, 0x1c, &(0x7f0000000300)=[{0x0}, {0x0}], 0x2}, 0x24048000) [ 532.294278] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:40 executing program 1: r0 = socket(0xa, 0x3, 0x5) accept4$unix(r0, 0x0, 0x0, 0x0) 14:58:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@private1}, 0x0, @in=@multicast2}}, 0xe8) 14:58:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}, 0x0) [ 532.367913] print_req_error: I/O error, dev loop5, sector 24 14:58:40 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000bbbbbb72d8bb81000000080045000053ffffeb"], 0x0) 14:58:40 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20080, 0x0) 14:58:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', &(0x7f00000007c0)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000800)={0x0, "dc849811b725b7e0878413632cf2a5a8381ef4c35b503299d58891127c583983a7faedd77fee1e1fe7092d2f76b1a89a5b865a2225f380afe13fd0d85e3627a1"}, 0x48, 0xffffffffffffffff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000006e40)) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f00000005c0)={0x0, @ipx={0x4, 0xbf, 0x1ff, "0f2c6838bf8a", 0xff}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, @ipx={0x4, 0x81, 0x6, "36e15b36633b", 0x62}, 0x81, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000380)='team0\x00', 0x3de5, 0x7, 0xa3}) recvfrom$unix(r0, 0x0, 0x0, 0x142, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000006e40)) recvmmsg(r3, &(0x7f0000000540)=[{{&(0x7f0000000100)=@tipc=@name, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/94, 0x5e}, {&(0x7f0000000200)=""/59, 0x3b}, {&(0x7f0000000280)=""/229, 0xe5}, {&(0x7f0000000380)}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/240, 0xf0}], 0x6}, 0x200}], 0x1, 0x12021, &(0x7f0000000580)={0x77359400}) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x4e20, @multicast1}, @generic={0x21, "6b4ecd7230e6c17ef7b503b15f2c"}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffff, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000000)='netpci0\x00', 0x9, 0x85e2, 0xff}) 14:58:40 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x80282) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 14:58:40 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000140)=@encrypted_load={'load ', 'default', 0x20, 'trusted:', '.request_key_auth\x00'}, 0x3e, 0xfffffffffffffffe) 14:58:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/nf_conntrack\x00') read$FUSE(r0, 0x0, 0x0) [ 532.468134] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:40 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000080)={@random="c2329fb1ab93", @remote, @void}, 0x0) 14:58:40 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000140)={@link_local, @link_local, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private=0xa010100, {[@rr={0x7, 0x3, 0xca}]}}}}}}, 0x0) 14:58:40 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0da9b3", 0x14, 0x6, 0x0, @loopback, @dev, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:58:40 executing program 4: r0 = socket(0x2, 0x3, 0x1) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:58:40 executing program 1: syz_emit_ethernet(0x11, &(0x7f0000000000)={@broadcast, @multicast, @void, {@mpls_uc={0x8847, {[], @llc={@llc={0x0, 0x0, '7'}}}}}}, 0x0) 14:58:40 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) read$alg(r0, &(0x7f0000001080)=""/4099, 0x1003) 14:58:40 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000080)={@link_local, @local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private=0xa010101, @multicast1}}}}}, 0x0) 14:58:40 executing program 1: r0 = socket(0xa, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000005900)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0}], 0x1, 0x8840) 14:58:40 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@link_local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "e4b47d", 0x18, 0x0, 0x0, @dev, @ipv4={[], [], @multicast1}, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@private2]}]}}}}}, 0x0) 14:58:40 executing program 3: r0 = socket(0x2, 0x3, 0x5) recvfrom$unix(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 532.665770] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:40 executing program 0: msgsnd(0x0, &(0x7f00000001c0)={0x1eb571e4ef7807eb, "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"}, 0xfd1, 0x800) 14:58:40 executing program 1: r0 = socket(0xa, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000007240)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}, @rights={{0xfffffffffffffeba}}], 0x30}], 0x1, 0x0) 14:58:40 executing program 2: rt_sigaction(0xa, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000180)) 14:58:40 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') [ 532.866430] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 [ 532.898740] print_req_error: I/O error, dev loop5, sector 24 14:58:41 executing program 4: r0 = socket(0x2, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="ff5073c769361b49", 0x8}, {0x0}, {&(0x7f00000001c0)="8f", 0x1}], 0x3, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xffffffffffffffff}}}, @rights={{0x10}}], 0x30}], 0x1, 0x0) 14:58:41 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timerfd_gettime(r0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) 14:58:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfff6, 0x0, '\x00\x00\x00#\x00'}) 14:58:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') write$tun(r0, 0x0, 0x0) 14:58:41 executing program 0: syz_emit_ethernet(0x52, &(0x7f0000000240)={@link_local, @multicast, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "3c2f8c", 0x18, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @mcast2}}}}}}, 0x0) 14:58:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:41 executing program 0: r0 = socket(0xa, 0x3, 0x5) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 14:58:41 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/key-users\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 14:58:41 executing program 4: r0 = socket(0x2, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="ff5073c769361b49", 0x8}, {&(0x7f0000000140)='@', 0x1}, {&(0x7f00000001c0)="8f", 0x1}], 0x3, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xffffffffffffffff}}}, @rights={{0x10}}], 0x30}], 0x1, 0x0) 14:58:41 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xa8401, 0x0) 14:58:41 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/bus/input/devices\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x3) 14:58:41 executing program 1: r0 = socket(0x11, 0x3, 0x0) accept$unix(r0, 0x0, 0x0) 14:58:41 executing program 0: socket(0x2, 0xa, 0x0) socket(0x11, 0x2, 0x0) 14:58:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/key-users\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 533.625566] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:41 executing program 3: openat$pfkey(0xffffffffffffff9c, 0x0, 0x4a6180, 0x0) 14:58:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/key-users\x00', 0x0, 0x0) dup2(r1, r0) 14:58:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 14:58:41 executing program 0: r0 = socket(0x2, 0x3, 0x1) connect$unix(r0, &(0x7f0000001680)=@abs, 0x6e) 14:58:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:41 executing program 3: r0 = socket(0xa, 0x3, 0x5) recvfrom$unix(r0, 0x0, 0x0, 0x21, 0x0, 0x0) [ 533.759769] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:41 executing program 0: r0 = socket(0x2, 0x3, 0x1) connect$unix(r0, &(0x7f0000001680)=@abs, 0x6e) 14:58:41 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000002f00)={0x0, 0x0, &(0x7f0000002ec0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="14000010"], 0x14}}, 0x0) 14:58:41 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000002f00)={0x0, 0x0, &(0x7f0000002ec0)={0x0, 0x14}}, 0x0) 14:58:41 executing program 1: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000400)='cpuset.memory_migrate\x00', 0x2, 0x0) 14:58:41 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 14:58:41 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x0) 14:58:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) 14:58:41 executing program 0: r0 = socket(0x2, 0xa, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000140)='gtp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 14:58:41 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 14:58:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000ac0)={@remote}) [ 533.932098] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:42 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000000)={@link_local, @multicast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0xd}, @multicast1}}}}}, 0x0) 14:58:42 executing program 1: syz_emit_ethernet(0x6f, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @private}, {0x0, 0x0, 0x4d, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "9671773b0a905037a9776cdf5ad0f6d7afb5641d76707161c640b9fce582a3c891c44f864dc11de77bc47905d6d893eb17450f868e316640063b357d97f96fa3ae"}}}}}}, 0x0) 14:58:42 executing program 4: r0 = socket(0x2, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x20000015, 0x0, 0x0) 14:58:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x379682, 0x0) 14:58:42 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x101200, 0x0) 14:58:42 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @multicast, @val={@void}, {@ipv6={0x86dd, @udp={0x0, 0x6, "43df18", 0x10, 0x11, 0x0, @private2, @private0, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) 14:58:42 executing program 1: syz_emit_ethernet(0x22, &(0x7f00000001c0)={@link_local, @random="5c14276a61e6", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}}, 0x0) 14:58:42 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@link_local, @multicast, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @private=0xa010102, {[@cipso={0x86, 0x6}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 14:58:42 executing program 2: r0 = socket(0x2, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="ff", 0x1}], 0x1}], 0x1, 0x0) [ 534.133492] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:42 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @remote, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @empty, @local, @empty, @loopback}}}}, 0x0) 14:58:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:42 executing program 0: r0 = socket(0x11, 0x3, 0x0) read$FUSE(r0, &(0x7f00000017c0)={0x2020}, 0x2020) 14:58:42 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x10140, 0x0) 14:58:42 executing program 4: capset(&(0x7f0000000300)={0x20080522}, &(0x7f0000000340)) msgctl$IPC_STAT(0x0, 0x2, 0x0) 14:58:42 executing program 2: syz_emit_ethernet(0x92, &(0x7f0000000040)={@link_local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0023d2", 0x5c, 0x2f, 0x0, @ipv4={[], [], @remote}, @private1, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 14:58:42 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) 14:58:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs_stats\x00') [ 534.294575] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:42 executing program 4: socket$inet6(0xa, 0x0, 0x1ff) 14:58:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/key-users\x00', 0x0, 0x0) dup2(r1, r0) 14:58:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_delroute={0x1c, 0x19, 0x403, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfd}}, 0x1c}}, 0x0) 14:58:42 executing program 3: getgroups(0x1, &(0x7f00000000c0)=[0xee01]) 14:58:42 executing program 2: r0 = socket(0xa, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0}], 0x1, 0x4040810) [ 534.464586] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:43 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@random="85556c765e80", @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "e47788", 0x18, 0x0, 0x0, @remote, @mcast2, {[@hopopts={0x0, 0x2, [], [@calipso={0x7, 0x8, {0x0, 0x19}}, @jumbo]}]}}}}}, 0x0) 14:58:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:43 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f00000000c0)={0x0, "fbdb9f4faae936ccd0caf6465773259b6b0da67da9561023517e7038ff3713d8375a4858bbb6930df572c908883a368557a333b95285d77f6ad054a8f94b8434"}, 0x48, 0xfffffffffffffff8) 14:58:43 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self\x00', 0x20040, 0x0) 14:58:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@private1, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x400}) 14:58:43 executing program 2: syz_emit_ethernet(0x4e, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100c20000bbbb218100000086dd"], 0x0) 14:58:43 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/key-users\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) dup2(r1, r0) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) 14:58:43 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @private}, {0x0, 0x0, 0x4c, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}, "9671773b0a905037a9776cdf5ad0f6d7afb5641d76707161c640b9fce582a3c891c44f864dc11de77bc47905d6d893eb17450f868e316640063b357d97f96fa3"}}}}}}, 0x0) 14:58:43 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000080)={@link_local, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "66c713", 0x10, 0x21, 0x0, @empty, @mcast1, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "131ec4", 0x0, "05668a"}}}}}}}, 0x0) 14:58:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @dev, 0x7ff}, 0x1c) [ 535.135672] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) 14:58:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:43 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000002f00)={0x0, 0x0, &(0x7f0000002ec0)={&(0x7f00000006c0)=ANY=[], 0x14}}, 0x0) 14:58:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@dontfrag={{0x14}}, @dstopts_2292={{0x18}}, @hoplimit_2292={{0x14}}], 0x48}, 0x24048000) 14:58:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_delroute={0x24, 0x19, 0x403, 0x0, 0x0, {0x2, 0x20}, [@RTA_DST={0x8, 0x1, @dev}]}, 0x24}}, 0x0) 14:58:43 executing program 4: syz_emit_ethernet(0x4e, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c2000000bbbbbbbbbbbb8100000086dd600da9b3001406002001000000000000fe80000000", @ANYRES32=0x41424344], 0x0) 14:58:43 executing program 0: r0 = socket(0xa, 0x3, 0x5) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x4805) 14:58:43 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') setns(r0, 0x0) setns(r0, 0x0) 14:58:43 executing program 4: r0 = socket(0x2, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0}], 0x1, 0x0) 14:58:43 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x200640, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, 0x0) 14:58:43 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000280)) [ 535.334435] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:58:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:43 executing program 0: syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') 14:58:43 executing program 4: r0 = socket(0xa, 0x3, 0x5) bind$unix(r0, 0x0, 0x0) 14:58:43 executing program 1: syz_emit_ethernet(0x42, &(0x7f0000000280)={@local, @local, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "e66e7a", 0x8, 0x0, 0x0, @local, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[@hopopts]}}}}}, 0x0) 14:58:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) 14:58:43 executing program 3: r0 = socket(0x2, 0x3, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 14:58:43 executing program 0: clock_gettime(0x0, &(0x7f0000000380)) 14:58:43 executing program 1: r0 = socket(0xa, 0x3, 0x5) connect$unix(r0, &(0x7f0000000500)=@file={0x0, './file0\x00'}, 0x6e) 14:58:43 executing program 2: syz_emit_ethernet(0xe, &(0x7f0000000040)={@broadcast, @link_local, @void, {@generic={0x8864}}}, 0x0) 14:58:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000002b00)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002ac0)={0x0}}, 0x0) 14:58:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 535.535797] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000440)='net/fib_triestat\x00') 14:58:43 executing program 0: r0 = socket(0x2, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000140)='@', 0x1}, {&(0x7f0000000000)="8f", 0x1}], 0x2, 0x0, 0x29, 0x20040000}], 0x1, 0x4804) 14:58:43 executing program 4: r0 = socket(0x2, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000140)='@', 0x1}, {&(0x7f00000001c0)="8f", 0xfffffdc8}], 0x2, 0x0, 0x0, 0x400c080}], 0x1, 0x0) 14:58:43 executing program 2: syz_emit_ethernet(0x26, &(0x7f0000000140)={@link_local, @link_local, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private=0xa010100, {[@noop]}}}}}}, 0x0) 14:58:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x4, 0x508, 0xffffffff, 0xd0, 0xd0, 0x368, 0xffffffff, 0xffffffff, 0x598, 0x598, 0x598, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0x270, 0x298, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@private0, @mcast2, @private0, @remote, @private1, @ipv4={[], [], @empty}, @mcast2, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, @mcast2, @empty, @mcast2]}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0xe0, 0x1f, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @private0, [0x0, 0x0, 0x0, 0xffffffff]}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@empty, @dev, [], [], 'ip6_vti0\x00', 'veth0_to_bond\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) 14:58:43 executing program 0: r0 = socket(0xa, 0x3, 0x5) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 14:58:43 executing program 3: r0 = getpgid(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x12, &(0x7f0000000040)={0x0, 0x0, 0x1}) 14:58:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 535.698389] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:43 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000000)='.dead\x00', 0x0, 0xfffffffffffffffa) 14:58:43 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 14:58:43 executing program 1: socket(0xa, 0x3, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/raw6\x00') read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 14:58:43 executing program 2: rt_sigaction(0x30, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000240)) 14:58:43 executing program 4: syz_emit_ethernet(0x222a, &(0x7f0000002440)=ANY=[], 0x0) 14:58:43 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) dup2(r0, r1) 14:58:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 535.841035] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x597d}, 0x1c, &(0x7f0000000300)=[{0x0}, {0x0}], 0x2, &(0x7f0000000340)=[@dontfrag={{0x14}}, @dstopts_2292={{0x18}}, @hoplimit_2292={{0x14}}, @rthdrdstopts={{0x18}}, @dstopts_2292={{0x18}}], 0x78}, 0x0) 14:58:43 executing program 2: getrandom(&(0x7f0000000000)=""/145, 0x91, 0x3) 14:58:43 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, 0x0) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) 14:58:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001a000be1"], 0x24}}, 0x0) 14:58:44 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "85abad", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:58:44 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/exec\x00') 14:58:44 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000040)={@link_local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0023d2", 0x44, 0x2f, 0x0, @ipv4={[], [], @remote}, @private1, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}, 0x0) 14:58:44 executing program 1: socket$inet6(0xa, 0x81002, 0x0) [ 536.007977] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:44 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') setns(r0, 0x0) 14:58:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:44 executing program 0: r0 = socket(0xa, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000007240)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="1c000000000000000100", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="00000000100000000000000001"], 0x30}], 0x1, 0x0) 14:58:44 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000100)={'stack ', '^\x00'}, 0x8) 14:58:44 executing program 1: timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x0, 0x989680}}, &(0x7f0000000400)) [ 536.089760] print_req_error: I/O error, dev loop5, sector 0 [ 536.095516] Buffer I/O error on dev loop5, logical block 0, async page read [ 536.106288] print_req_error: I/O error, dev loop5, sector 4 [ 536.112258] Buffer I/O error on dev loop5, logical block 2, async page read [ 536.119499] print_req_error: I/O error, dev loop5, sector 6 [ 536.125252] Buffer I/O error on dev loop5, logical block 3, async page read 14:58:44 executing program 4: r0 = socket(0x2, 0x3, 0x1) getpeername$unix(r0, 0x0, 0x0) 14:58:44 executing program 2: syz_genetlink_get_family_id$smc(&(0x7f00000004c0)='SMC_PNETID\x00', 0xffffffffffffffff) 14:58:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000054c0)={'ah\x00'}, &(0x7f0000005500)=0x1e) 14:58:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 536.194413] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:44 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/slabinfo\x00', 0x0, 0x0) read$alg(r0, &(0x7f0000001080)=""/4086, 0xff6) 14:58:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, &(0x7f0000002b40)=@isdn, &(0x7f0000002bc0)=0x80) 14:58:44 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x33, 0x0, @dev, @remote}}}}}, 0x0) 14:58:44 executing program 1: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@link_local, @multicast, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "504696", 0x0, 0x32, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local}}}}, 0x0) 14:58:44 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000980)='net/rt_acct\x00') 14:58:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) [ 536.280834] audit: type=1400 audit(1618844324.243:78): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="^" pid=31889 comm="syz-executor.3" 14:58:44 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @multicast, @val={@void}, {@ipv4={0x800, @generic={{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x33, 0x0, @broadcast, @empty, {[@cipso={0x86, 0x3d, 0x0, [{0x0, 0xe, "c3a4acba321f873e0d64fccc"}, {0x0, 0x4, "e8d3"}, {0x0, 0x12, "0c431b1934857efd90b8711f0b1d6a77"}, {0x0, 0x7, "5676b374db"}, {0x0, 0x5, "3ab993"}, {0x0, 0x4, "f7c2"}, {0x0, 0x3, 'i'}]}]}}}}}}, 0x0) 14:58:44 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb8100000086dd60"], 0x0) 14:58:44 executing program 1: r0 = socket(0x2, 0x1, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000140)='gtp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 14:58:44 executing program 3: r0 = socket(0x2, 0x3, 0x1) connect$unix(r0, 0x0, 0x5e) 14:58:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 536.397997] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:44 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='auxv\x00') 14:58:44 executing program 2: syz_emit_ethernet(0xb7, &(0x7f0000000080)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "e47788", 0x81, 0x1, 0x0, @dev={0xfe, 0x80, [], 0xa}, @ipv4={[], [], @private}, {[@srh={0x29, 0xe, 0x4, 0x7, 0x1, 0x28, 0x0, [@private2, @remote, @empty, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @private0]}], "07876f1ec54da09dad"}}}}}, &(0x7f00000001c0)={0x1, 0x0, [0xfd5, 0x283, 0xe72, 0x4d7]}) 14:58:44 executing program 4: r0 = socket(0xa, 0x3, 0x5) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 14:58:44 executing program 0: r0 = socket(0x2, 0x1, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000021c0)={0x0}}, 0x4000) 14:58:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@dontfrag={{0x14}}, @dstopts_2292={{0x18}}, @hoplimit_2292={{0x14}}, @rthdrdstopts={{0x18}}], 0x60}, 0x24048000) 14:58:44 executing program 3: syz_emit_ethernet(0x23, &(0x7f0000000040)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9d4580", 0x8, 0x3a, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[], @mlv2_report}}}}}, 0x0) [ 536.529589] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:44 executing program 2: r0 = socket(0x2, 0x1, 0x0) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f0000000080)={0x14}, 0x14}}, 0x24000000) 14:58:44 executing program 4: r0 = socket(0x2, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000000)='M', 0x1}], 0x1}], 0x1, 0x4040810) 14:58:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:44 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@multicast, @dev, @void, {@ipv4={0x800, @generic={{0xc, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr, {[@ssrr={0x89, 0x3}, @ssrr={0x89, 0x7, 0x0, [@broadcast]}, @ssrr={0x89, 0xf, 0x0, [@empty, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}}, 0x0) [ 536.588620] print_req_error: I/O error, dev loop5, sector 0 [ 536.594543] Buffer I/O error on dev loop5, logical block 0, async page read [ 536.602779] print_req_error: I/O error, dev loop5, sector 4 [ 536.608935] Buffer I/O error on dev loop5, logical block 2, async page read [ 536.616086] print_req_error: I/O error, dev loop5, sector 6 [ 536.621949] Buffer I/O error on dev loop5, logical block 3, async page read 14:58:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000040)=ANY=[], 0xd0) 14:58:44 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000300)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "e47788", 0x8, 0x0, 0x0, @dev, @ipv4={[], [], @private}, {[@routing={0x0, 0x0, 0x1, 0x2}]}}}}}, 0x0) 14:58:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 14:58:44 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, 0x0) 14:58:44 executing program 3: r0 = socket(0x11, 0x3, 0x0) connect$unix(r0, 0x0, 0x0) 14:58:44 executing program 1: r0 = socket(0x2, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0}], 0x1, 0x4c084) 14:58:44 executing program 0: select(0x40, &(0x7f0000000000), &(0x7f00000000c0)={0x6}, 0x0, &(0x7f0000000140)={0x77359400}) [ 536.753258] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:44 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 14:58:44 executing program 4: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, r1+60000000}, {0x0, 0x989680}}, 0x0) timerfd_gettime(r0, &(0x7f0000000000)) 14:58:44 executing program 1: syz_emit_ethernet(0x4e, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c2000000bbbbbbbbbbbb8100000086dd600da9b3001406002088010e2dc158c001000000000000f3ffff"], 0x0) 14:58:44 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ptmx\x00', 0x480, 0x0) [ 536.818030] print_req_error: I/O error, dev loop5, sector 0 [ 536.823847] Buffer I/O error on dev loop5, logical block 0, async page read [ 536.833069] print_req_error: I/O error, dev loop5, sector 4 [ 536.839554] Buffer I/O error on dev loop5, logical block 2, async page read [ 536.846691] print_req_error: I/O error, dev loop5, sector 6 [ 536.853976] Buffer I/O error on dev loop5, logical block 3, async page read 14:58:44 executing program 2: r0 = inotify_init() poll(&(0x7f0000000000)=[{r0}], 0x1, 0x5) 14:58:44 executing program 0: syz_emit_ethernet(0x6f, &(0x7f00000000c0)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x11, 0x0, @empty}, {0x0, 0x0, 0x4d, 0x0, @wg=@data={0x4, 0x0, 0x0, "e4d9a14cad2fbdb4265aa64bb298fb6a8c52bbaa6c1712b6f0cda3376bc5a09e796dd21a1a8cad2d58b672cfb478127354c6e6e3ee"}}}}}}, 0x0) 14:58:44 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000280)={@random="85556c765e80", @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "e47788", 0x10, 0x0, 0x0, @remote, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[@hopopts={0x0, 0x1, [], [@generic={0x80}, @jumbo]}]}}}}}, 0x0) 14:58:44 executing program 3: ioperm(0x0, 0x1c7, 0x0) 14:58:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x4, 0x668, 0xffffffff, 0xd0, 0xd0, 0x368, 0xffffffff, 0xffffffff, 0x598, 0x598, 0x598, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0x270, 0x298, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@private0, @mcast2, @private0, @remote, @private1, @ipv4={[], [], @empty}, @mcast2, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, @mcast2, @empty, @mcast2]}}, @common=@srh1={{0x90, 'srh\x00'}, {0x87, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @private0, [0x0, 0x0, 0x0, 0xffffffff]}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@empty, @dev={0xfe, 0x80, [], 0x25}, [0x0, 0x0, 0xff000000], [0x0, 0xffffffff, 0xff], 'ip6_vti0\x00', 'veth0_to_bond\x00', {}, {}, 0x3a, 0x5, 0x1}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@mcast2, @private0, @loopback, @private0, @ipv4={[], [], @multicast1}, @mcast2, @mcast2, @mcast1, @mcast2, @private2={0xfc, 0x2, [], 0x1}, @private0, @private0, @private1, @private2, @private0, @private0]}}, @common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "aa85"}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6c8) 14:58:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:58:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0xd0) [ 536.975250] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:45 executing program 1: r0 = socket(0x2, 0xa, 0x0) sendmmsg$unix(r0, &(0x7f0000010cc0)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0}], 0x1, 0x0) 14:58:45 executing program 3: r0 = socket(0xa, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000007240)=[{&(0x7f0000000080)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000013c0)=ANY=[], 0x30}], 0x1, 0x0) 14:58:45 executing program 4: r0 = socket(0xa, 0x3, 0x5) sendmmsg$unix(r0, &(0x7f0000007680)=[{&(0x7f0000000100)=@abs, 0x6e, 0x0}], 0x1, 0x8090) 14:58:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 14:58:45 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000), 0x4) 14:58:45 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000010500)="7f000000ffffffff", 0x8}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc020660b, &(0x7f0000000240)=ANY=[]) 14:58:45 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x41e000, 0x0) 14:58:45 executing program 4: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) [ 537.181426] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated 14:58:45 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 14:58:45 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000480)={[{@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x0]}}]}) 14:58:45 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}}, &(0x7f0000000140)) [ 537.248309] EXT4-fs (loop5): get root inode failed [ 537.253357] audit: type=1800 audit(1618844325.213:79): pid=32033 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=15553 res=0 [ 537.262413] EXT4-fs (loop5): mount failed 14:58:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00', r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x134, r1, 0x601, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x106, 0x1, '\x10\x80\x03l\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\x00CR\xf6)bs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1SY\n\xfbn\xbe\xb1\xbef\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd5\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback=0x7f000003}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}]}, 0x134}}, 0x0) 14:58:45 executing program 4: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}}, &(0x7f0000000140)) 14:58:45 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x16, 0x0, 0x0) 14:58:45 executing program 2: getresuid(&(0x7f00000003c0), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="18a1b44c2cc89ffefbf4fa0c35d60562ae7bbde0ea39d904024e", 0x1a}, {&(0x7f0000000140)="061f602b46cb6af86d036b328dc9dbd6e72edbb46b6bac84a9933966003847ef4bf19bb5d1697b05f62c22a4104756da8a50db776487ded946bf5a5943dcf4", 0x3f, 0x81}], 0x802, &(0x7f0000000480)={[{@size={'size', 0x3d, [0x30, 0x33]}}, {@gid={'gid', 0x3d, 0xee01}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x0, 0x30]}}, {@huge_advise='huge=advise'}, {@gid={'gid'}}, {@huge_never='huge=never'}, {@gid={'gid'}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x31, 0x0, 0x32, 0x65, 0x36, 0x30], 0x2d, [], 0x2d, [0x35, 0x61, 0x33, 0x32], 0x2d, [0x34, 0x66, 0x0, 0x31], 0x2d, [0x61, 0x0, 0x61, 0x32, 0x4b, 0x38, 0x32]}}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@hash='hash'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@dont_appraise='dont_appraise'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@euid_gt={'euid>', 0xee00}}]}) [ 537.354702] audit: type=1804 audit(1618844325.263:80): pid=32033 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir831152200/syzkaller.O0lgZr/827/file0" dev="sda1" ino=15553 res=1 14:58:45 executing program 4: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) 14:58:45 executing program 0: futex(&(0x7f0000000040), 0x0, 0x2, 0x0, 0x0, 0x0) 14:58:45 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0x1}, &(0x7f0000000180), 0x0) 14:58:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001600), 0x80, &(0x7f00000016c0)={[{@compress='compress'}, {@thread_pool={'thread_pool', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) 14:58:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00', r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x134, r1, 0x601, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x106, 0x1, '\x10\x80\x03l\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\x00CR\xf6)bs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1SY\n\xfbn\xbe\xb1\xbef\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd5\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback=0x7f000003}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}]}, 0x134}}, 0x0) [ 537.484992] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 537.500286] audit: type=1804 audit(1618844325.263:81): pid=32040 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir831152200/syzkaller.O0lgZr/827/file0" dev="sda1" ino=15553 res=1 14:58:45 executing program 0: pselect6(0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x0) 14:58:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCDELRT(r0, 0x8912, &(0x7f0000000200)={0x28, @nl=@proc, @rc, @l2tp={0x2, 0x0, @private}}) [ 537.560707] EXT4-fs (loop5): get root inode failed [ 537.577021] EXT4-fs (loop5): mount failed 14:58:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:45 executing program 3: socketpair(0x1d, 0x2, 0x2, &(0x7f0000002240)) 14:58:45 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040), 0x10) modify_ldt$write2(0x11, &(0x7f0000000000)={0xc97}, 0x10) 14:58:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000280)="8199ee7e19ff010000008107008d2300000000a440f03562e3493c00005536b560000001040000000000604d6c7d00000000545c4d8810a49792055f000855aa", 0x40, 0x1c0}]) 14:58:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00', r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x134, r1, 0x601, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x106, 0x1, '\x10\x80\x03l\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\x00CR\xf6)bs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1SY\n\xfbn\xbe\xb1\xbef\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd5\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback=0x7f000003}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}]}, 0x134}}, 0x0) 14:58:45 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@uid={'uid'}}]}) 14:58:45 executing program 4: clock_settime(0x4, 0x0) 14:58:45 executing program 3: setpriority(0x2, 0x0, 0x200) 14:58:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00', r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x134, r1, 0x601, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x106, 0x1, '\x10\x80\x03l\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\x00CR\xf6)bs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1SY\n\xfbn\xbe\xb1\xbef\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd5\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback=0x7f000003}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}]}, 0x134}}, 0x0) 14:58:45 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 14:58:45 executing program 2: r0 = socket(0x2, 0x1, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:58:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82278, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 537.784777] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 537.822519] EXT4-fs (loop5): get root inode failed [ 537.859600] EXT4-fs (loop5): mount failed 14:58:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:45 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8541, 0x0) write$tun(r0, 0x0, 0x112) 14:58:45 executing program 3: pselect6(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180), 0x0) 14:58:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_GETXATTR(r0, 0x0, 0x0) 14:58:45 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{}, {0x77359400}}, 0x0) 14:58:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:46 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f00000015c0), &(0x7f0000001600)=0x4) 14:58:46 executing program 0: perf_event_open(&(0x7f0000002800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:58:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000fd9cd6ccedbb2910000000140001800800030000000000080001"], 0x28}}, 0x0) 14:58:46 executing program 2: r0 = getpid() ptrace$setopts(0x4206, r0, 0x4000000, 0x0) 14:58:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0xc, 0x0, 0x4) [ 538.040564] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 538.040564] 14:58:46 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup2(r0, r0) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x0, r2}, 0x50) listxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000006a40)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, r3}, 0x50) 14:58:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:46 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, 0x0) 14:58:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x2, &(0x7f0000001600)=[{&(0x7f0000000340)}, {0x0, 0x0, 0x17ef3ea3}], 0x80, &(0x7f00000016c0)={[{@thread_pool={'thread_pool'}}]}) 14:58:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f00000001c0)=@nl=@unspec, 0x80) 14:58:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@empty, @broadcast}, 0xc) 14:58:46 executing program 1: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) [ 538.847682] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 538.847682] 14:58:46 executing program 2: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) creat(0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc01812f4, &(0x7f0000000140)={0x8167002, 0x0, 0x800000000000}) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x40002, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x4, 0xe0, 0x0, 0x9, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb8c, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x5420, 0x9, 0x5, 0x3, 0x9, 0x2, 0x5}, r2, 0x0, r3, 0x8) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b", 0x15, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x64) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)="22f717177292c2c7bcb4eb8893c2a5a8b969d9ddffa3b26b", 0x18}, {&(0x7f0000000300)="8e9349eadb613c535a9f124d68a22a", 0xf}], 0x2, 0x0, 0x0, 0x4050001}, 0x8000) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, &(0x7f00000055c0)=[{{&(0x7f0000000140)=@sco={0x1f, @none}, 0x80, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x3}}, {{&(0x7f0000000640)=@phonet, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/34, 0x22}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)=""/35, 0x23}, 0x2}, {{&(0x7f0000001900)=@nl, 0x80, &(0x7f0000002c00)=[{0x0}], 0x1}, 0x2}, {{&(0x7f0000002cc0)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000003200)=[{0x0}, {&(0x7f0000002fc0)=""/213, 0xd5}, {0x0}], 0x3, &(0x7f0000003280)=""/239, 0xef}, 0x1000}, {{&(0x7f0000003380)=@ethernet={0x0, @link_local}, 0x80, 0x0}, 0xdd7a}], 0x6, 0x0, 0x0) 14:58:46 executing program 1: clock_getres(0x0, &(0x7f0000000000)) clock_gettime(0x7, &(0x7f0000000500)) 14:58:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x12, 0x0, 0x0) 14:58:46 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/time\x00') 14:58:47 executing program 4: modify_ldt$read_default(0x2, &(0x7f0000000140)=""/137, 0x89) 14:58:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000240), 0x4) [ 539.038798] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 539.066778] EXT4-fs (loop5): get root inode failed [ 539.082959] EXT4-fs (loop5): mount failed 14:58:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:47 executing program 0: socketpair(0x1d, 0x0, 0x0, &(0x7f0000002240)) 14:58:47 executing program 1: wait4(0x0, 0x0, 0x0, &(0x7f0000000140)) ioprio_set$uid(0x3, 0x0, 0x0) 14:58:47 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/time_for_children\x00') 14:58:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @remote}, 0x10) 14:58:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}}, 0x0) 14:58:47 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 539.211608] can: request_module (can-proto-0) failed. 14:58:47 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/time_for_children\x00') ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, 0x0) [ 539.236679] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 539.264414] can: request_module (can-proto-0) failed. 14:58:47 executing program 3: syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001600)=[{&(0x7f0000000300)="eb", 0x1}, {&(0x7f00000003c0)="87", 0x1, 0x17ef3ea3}], 0x0, 0x0) 14:58:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x8, 0x2, 0x0, 0x1, [{0x4}]}]}, 0x20}}, 0x0) 14:58:47 executing program 0: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:58:47 executing program 1: sched_setparam(0x0, &(0x7f0000000140)=0x1) 14:58:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_GETXATTR(r0, &(0x7f00000004c0)={0x18}, 0x18) 14:58:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 539.299234] EXT4-fs (loop5): get root inode failed [ 539.304503] EXT4-fs (loop5): mount failed 14:58:47 executing program 2: ioprio_set$uid(0x0, 0xee01, 0x0) 14:58:47 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x60000, 0x0) 14:58:47 executing program 0: perf_event_open(&(0x7f0000001380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x84}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) 14:58:47 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/vcs\x00', 0x101000, 0x0) 14:58:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x2c, r1, 0xc4aff74ef5d975e1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}]}, 0x2c}}, 0x0) [ 539.438906] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 539.472788] EXT4-fs (loop5): get root inode failed 14:58:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000140)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) [ 539.486774] EXT4-fs (loop5): mount failed 14:58:47 executing program 3: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1}) 14:58:47 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000001300)=[{{&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, 0x0}}], 0x1, 0x0) 14:58:47 executing program 4: r0 = socket(0x2, 0xa, 0x0) io_setup(0x5, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000002880)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 14:58:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100"/120, 0x78, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:47 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 14:58:47 executing program 2: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc01812f4, &(0x7f0000000140)={0x8167002, 0x0, 0x800000000000}) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x40002, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x2e, 0x6, 0x4, 0xe0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb8c, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x5420, 0x9, 0x5, 0x3, 0x9, 0x2, 0x5}, 0x0, 0x0, r2, 0x8) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0", 0x2d, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x64) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)="22f717177292c2c7bcb4eb8893c2a5a8b969", 0x12}, {&(0x7f0000000300)="8e9349eadb613c535a9f124d68a22a", 0xf}], 0x2, 0x0, 0x0, 0x4050001}, 0x8000) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, &(0x7f00000055c0)=[{{&(0x7f0000000140)=@sco={0x1f, @none}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x3}, 0x81}, {{&(0x7f0000000640)=@phonet, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/34, 0x22}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)=""/35, 0x23}, 0x2}, {{0x0, 0x0, 0x0}, 0x2}, {{&(0x7f0000002cc0)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000003200)=[{0x0}, {0x0}], 0x2, &(0x7f0000003280)=""/239, 0xef}}, {{&(0x7f0000003380)=@ethernet={0x0, @link_local}, 0x80, 0x0}, 0xdd7a}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 14:58:47 executing program 1: get_robust_list(0x0, 0x0, &(0x7f0000000180)) 14:58:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="66530700ae897094e7b126b097eaa769be6d05c41bd36ab95156e9962f38ee9611b9774e677d114b65c44f7b7d9ce423c22f45958dc387a323aa893a8cf41753ba5dcf4c2e1fea4b7a3dfc8ea6a7efef7990d00d51feaa24440d21e48dd9e05485b4ff95f715134d82ce9c0952d644157684e3dae491de7600a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d315ec9b327320a8f91e7f0d2e9c88f5ac7a0b6f7274692f3cae6770a9b08819ff285047a7bd9682174b5d32b2badc891f39848a344cd384d203bbbb3e42f6515325c87b14de6dde5412765e3567b1a2f989a000000000000d873fe21694b88126e95c6f7938b6a9da39706fa2543471189dc4f4d768e6b2a3995c6cfcbb96d93a941796cf6b6cb40360c0955897a18de", 0x125}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:58:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0xc, 0x0, 0x0) [ 539.669736] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 539.669736] 14:58:47 executing program 4: r0 = getpid() ptrace$setopts(0x10, r0, 0x0, 0x0) 14:58:47 executing program 1: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x428943, 0x0) 14:58:47 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f0000001200)=[{0x0}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, &(0x7f0000001680)=[{&(0x7f0000001280)=""/6, 0x6}, {&(0x7f00000013c0)=""/245, 0xf5}], 0x2, 0x0) [ 539.772681] ptrace attach of "/root/syz-executor.0"[32299] was attempted by "/root/syz-executor.0"[32300] 14:58:47 executing program 3: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x15, &(0x7f0000000840)={@broadcast, @random="9fe69f20ab1c", @val={@void}, {@x25}}, 0x0) 14:58:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000002480)='NLBL_MGMT\x00', r0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f00000024c0)={0x14, r2, 0x585c3f90707004e7}, 0x14}}, 0x0) 14:58:47 executing program 2: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc01812f4, &(0x7f0000000140)={0x8167002, 0x0, 0x800000000000}) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x40002, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x2e, 0x6, 0x4, 0xe0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb8c, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x5420, 0x9, 0x5, 0x3, 0x9, 0x2, 0x5}, 0x0, 0x0, r2, 0x8) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0", 0x2d, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x64) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)="22f717177292c2c7bcb4eb8893c2a5a8b969", 0x12}, {&(0x7f0000000300)="8e9349eadb613c535a9f124d68a22a", 0xf}], 0x2, 0x0, 0x0, 0x4050001}, 0x8000) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, &(0x7f00000055c0)=[{{&(0x7f0000000140)=@sco={0x1f, @none}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x3}, 0x81}, {{&(0x7f0000000640)=@phonet, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/34, 0x22}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)=""/35, 0x23}, 0x2}, {{0x0, 0x0, 0x0}, 0x2}, {{&(0x7f0000002cc0)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000003200)=[{0x0}, {0x0}], 0x2, &(0x7f0000003280)=""/239, 0xef}}, {{&(0x7f0000003380)=@ethernet={0x0, @link_local}, 0x80, 0x0}, 0xdd7a}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 14:58:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000004800)=[{{0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000000200)="046837a94c18418c35f9fed27f3f1b0ac0e5d3127ce99d08bde4fb5e148532910895d8d492510fbc626ae415bf2bb16ba6aff62613a4e16d1081cbbcf04dfa425c52db999c72fb355ac34fe9848d3ae03b6a66da5501992ed3457ce9abbe094afb982c78025d321b2f0b96e2c5bad1d816fa44e95923c19cdec8dca5a4f540cf40f16924760af50631b90ea49c76d3d0a42991339bd4ba97ed666c4601be6586a12a86a7bcef4ad3a859cc8f075972259f3d9a4cb40c56ece56a67ecdc924b2cdee2946b2d83c43ac3", 0xc9}], 0x1}}, {{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="8937cc9d9afa064524eb42331ba3c46dbba08b9d0257db7da5a9f150c6fabef6778f6ad7dbd8fb65cf67d971ac24422355f124714988c7", 0x37}], 0x1}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000900)="b236b910f0130fb57d328de55930d126522d61b7cbdc9de82492f5e2b91407a4176e52a7cb7441027874e56dc60075d9054a", 0x32}], 0x1}}], 0x3, 0x0) 14:58:48 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, &(0x7f0000001600)) 14:58:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002180)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) 14:58:48 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmmsg$inet(r0, &(0x7f0000007180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:58:48 executing program 2: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc01812f4, &(0x7f0000000140)={0x8167002, 0x0, 0x800000000000}) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x40002, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x2e, 0x6, 0x4, 0xe0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb8c, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x5420, 0x9, 0x5, 0x3, 0x9, 0x2, 0x5}, 0x0, 0x0, r2, 0x8) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0", 0x2d, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x64) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)="22f717177292c2c7bcb4eb8893c2a5a8b969", 0x12}, {&(0x7f0000000300)="8e9349eadb613c535a9f124d68a22a", 0xf}], 0x2, 0x0, 0x0, 0x4050001}, 0x8000) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, &(0x7f00000055c0)=[{{&(0x7f0000000140)=@sco={0x1f, @none}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x3}, 0x81}, {{&(0x7f0000000640)=@phonet, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/34, 0x22}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)=""/35, 0x23}, 0x2}, {{0x0, 0x0, 0x0}, 0x2}, {{&(0x7f0000002cc0)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000003200)=[{0x0}, {0x0}], 0x2, &(0x7f0000003280)=""/239, 0xef}}, {{&(0x7f0000003380)=@ethernet={0x0, @link_local}, 0x80, 0x0}, 0xdd7a}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 540.482356] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 540.482356] 14:58:48 executing program 4: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x40002, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x2e, 0x6, 0x4, 0xe0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x5420, 0x9, 0x5, 0x3, 0x9, 0x2, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) sendto$inet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x4008800, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x64) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)="22f717177292c2c7bcb4eb8893c2a5a8b969d9ddffa3b26b", 0x18}, {&(0x7f0000000300)="8e9349eadb613c535a9f124d68a22a", 0xf}, {&(0x7f0000001740)="a042fc1b8f241d6ff13762a5c2775757fa073b75f2694a93b838e80f649ca84782cbe16eb45ada11e493a57e53a69a32c480020bc24e12afe991e6ef2d07e8b5aa0aebf913abda6fd501825caf9391e9e8a85a87b83c3ddf0e67f4d28f767636677c375b3fab5e1bddced048d1efcbf03daecc8c996fe4b9d7ee697c50d103bd5616b9b397b6ea1eadb4e7dac27b33c844694e07ced2e9bad148184e6c81726c7d381c3ced609d38af879fccbc7e4d4aae9c86da51c3033211bbaf640288", 0xbe}], 0x3, 0x0, 0x0, 0x4050001}, 0x8000) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, &(0x7f00000055c0)=[{{&(0x7f0000000140)=@sco={0x1f, @none}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x2}, 0x81}, {{&(0x7f0000000640)=@phonet, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/34, 0x22}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)=""/35, 0x23}, 0x2}, {{&(0x7f0000001900)=@nl, 0x80, &(0x7f0000002c00)=[{0x0}, {&(0x7f0000002bc0)=""/43, 0x2b}], 0x2}, 0x2}, {{&(0x7f0000002cc0)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000003200)=[{0x0}, {&(0x7f0000002fc0)=""/213, 0xd5}, {0x0}], 0x3, &(0x7f0000003280)=""/239, 0xef}, 0x1000}, {{&(0x7f0000003380)=@ethernet={0x0, @link_local}, 0x80, 0x0}, 0xdd7a}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 14:58:48 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000003b00)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x541b, 0x0) 14:58:48 executing program 0: modify_ldt$write2(0x11, 0x0, 0x0) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="18", 0x1, 0x8}, {&(0x7f0000000140)="061f60", 0x3, 0x81}], 0x802, &(0x7f0000000480)={[{@size={'size', 0x3d, [0x30, 0x33]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x0, 0x0]}}, {@huge_never='huge=never'}, {@gid={'gid'}}, {@uid={'uid', 0x3d, r0}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@hash='hash'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', 0xee00}}, {@dont_appraise='dont_appraise'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@euid_gt={'euid>', 0xee00}}]}) 14:58:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCDELRT(r0, 0x5421, &(0x7f0000000200)={0x0, @nl=@proc, @rc, @l2tp={0x2, 0x0, @private}}) [ 540.722849] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated 14:58:48 executing program 0: uname(&(0x7f0000000080)=""/160) 14:58:48 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@mpol={'mpol', 0x3d, {'local'}}}]}) [ 540.801088] EXT4-fs (loop5): get root inode failed [ 540.812657] EXT4-fs (loop5): mount failed 14:58:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x2c}}, 0x0) 14:58:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)) [ 540.956681] tmpfs: Bad value 'local:' for mount option 'mpol' [ 541.003101] tmpfs: Bad value 'local:' for mount option 'mpol' 14:58:49 executing program 0: setfsgid(0xee01) 14:58:49 executing program 3: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x15, &(0x7f0000000840)={@broadcast, @random="9fe69f20ab1c", @val={@void, {0x8100, 0x7}}, {@x25}}, 0x0) 14:58:49 executing program 4: timer_create(0x0, &(0x7f0000000000)={0x0, 0x2b}, &(0x7f0000000040)) 14:58:49 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000001200)=[{&(0x7f0000000000)=""/215, 0xd7}], 0x1, &(0x7f0000001680)=[{&(0x7f00000012c0)=""/245, 0xf5}, {0x0}], 0x2, 0x0) 14:58:49 executing program 2: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc01812f4, &(0x7f0000000140)={0x8167002, 0x0, 0x800000000000}) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x40002, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x2e, 0x6, 0x4, 0xe0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb8c, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x5420, 0x9, 0x5, 0x3, 0x9, 0x2, 0x5}, 0x0, 0x0, r2, 0x8) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0", 0x2d, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x64) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)="22f717177292c2c7bcb4eb8893c2a5a8b969", 0x12}, {&(0x7f0000000300)="8e9349eadb613c535a9f124d68a22a", 0xf}], 0x2, 0x0, 0x0, 0x4050001}, 0x8000) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, &(0x7f00000055c0)=[{{&(0x7f0000000140)=@sco={0x1f, @none}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x3}, 0x81}, {{&(0x7f0000000640)=@phonet, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/34, 0x22}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)=""/35, 0x23}, 0x2}, {{0x0, 0x0, 0x0}, 0x2}, {{&(0x7f0000002cc0)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000003200)=[{0x0}, {0x0}], 0x2, &(0x7f0000003280)=""/239, 0xef}}, {{&(0x7f0000003380)=@ethernet={0x0, @link_local}, 0x80, 0x0}, 0xdd7a}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 14:58:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 541.046290] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 541.076041] EXT4-fs (loop5): get root inode failed [ 541.085354] EXT4-fs (loop5): mount failed 14:58:49 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./bus/file0\x00', 0x0) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 14:58:49 executing program 1: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@remote, @multicast, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "94bad3", 0x0, 0x0, 0x0, @private1, @private1}}}}, 0x0) 14:58:49 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000001080)='/proc/timer_list\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000140)=""/227, 0xe3) 14:58:49 executing program 4: openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff]}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000280)={0x3ff, 0x0, 0x4, 0x0, 0x3, {}, {0x2, 0x8, 0x8, 0xff, 0x1, 0x2, "0056ae04"}, 0x3b8a, 0x0, @planes=0x0, 0x401}) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x8e182) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) 14:58:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f47", 0x8b}, {&(0x7f0000001340)="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", 0x1b8}], 0x3) 14:58:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000006b40)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, r0) [ 541.245832] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 541.281931] EXT4-fs (loop5): get root inode failed [ 541.291931] EXT4-fs (loop5): mount failed 14:58:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x1ff, 0x1d33ab67}]}) 14:58:49 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80882, 0x0) write$sequencer(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="a2fe9f987ae7ce008108"], 0x10) 14:58:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000d40)=@newlink={0x44, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_SNOOPING={0x5}, @IFLA_BR_MCAST_IGMP_VERSION={0x5}]}}}]}, 0x44}}, 0x0) 14:58:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201000000000000", 0x6c, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:49 executing program 0: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000240)="06", 0x1, 0xfffffffffffffffc) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, r0) 14:58:49 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 14:58:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000040)={'team_slave_1\x00', @ifru_hwaddr=@dev}) 14:58:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000180)=""/146, &(0x7f0000000240)=0x92) 14:58:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x4, 0x4, 0x80000001, 0x800, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x40) [ 541.717163] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 541.717163] 14:58:49 executing program 4: openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff]}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000280)={0x3ff, 0x0, 0x4, 0x0, 0x3, {}, {0x2, 0x8, 0x8, 0xff, 0x1, 0x2, "0056ae04"}, 0x3b8a, 0x0, @planes=0x0, 0x401}) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x8e182) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) 14:58:49 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x2500, 0x0) 14:58:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @mss, @window, @mss], 0x4) 14:58:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8904, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 14:58:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x541b, &(0x7f0000000080)={'syztnl1\x00', 0x0}) 14:58:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff7, 0x11, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f000026d000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, 0x0) 14:58:50 executing program 1: memfd_create(&(0x7f00000002c0)='\xcaw\xf7\xf1\x95R\t\x10d\xaaR4\xbb/\xa5\'c,\x06X\x97F:-`\xb1r\x15\x06\x10D\'\x110;\x02\xd0\xb5\xf3\xfb\v{PP\x92j\nU\x9a>~\xa4\xfbJ.\xa4\xee\xef\xe5\xea\xd3\xc8\vw\x89\xe3#\x0f\xfe\xbf\v\xf4\xaf\xe0iM\x9e\xae6O0\x1bucg\xac\x0f\n\xadz\x1c7\xdc\x054noM\x9d\xee\x16\xabn\x11\xb5\xb1\xfe\xaf\x94\x04\xf2f!U\xe2\x13\x8e.UCb\xacn\xb02Cx)\xa7\xf7\xbd\x90Z;\xc6\xc2\xf6\x89\xaf\xd0i#Vg\x84y\x9c\x9cc\xf5R\xd19\xfc\xbcG\xd4R\x9c:\xb4\x05\xf7Xn\x85\xa1)\xaebj\x16\x8bi\x91\xbb\xfe\r\xc6D\xc7\xec\xa3\x9e\x94E\x89\xf7-\xe2\xc29\x99,\xe4\x01*\xb3\xfb\x81\bm\xcck\x01mi\xaexj\xc4i,c\xefpZ\xfa=\xbd\x1e\x0fL\x03\xc6\xc9\xd2pr\xca\xaay\x10\xb8\xd6O\x19LD\xc3\xa7\xad\x02\x00\x00\x00\x00\x00\x00\x00_Jvjf\xa6\x18 \xd2h\x9am9i\xa9M\x0fr\x89d\x87:J\x14G\x1a\x1e\xfc~\x14~\v\xfc#\xf0\x81\t \xce$\xa4\xaeO\x87\x19\xb4!\xb4\xac\xb4\x81\xdcl\xa7I,\xef+b\xd7\xc9\xe6(?\xd7G]\x7fz\xc6K\xea,%\x97\xa4\xce\xac\xb1\xe6i\x04\xed\xaa\xc0[\xda\xbe\x1f\x15o\xaa\xb78\x8c\xf6\xe3\xff\xc0\x122\x83\x8b\x92LV 5\xfa\xc2\xa5\v\xc0\x972S\xeag\xb34\x1b\x9e\x9a\x8aU\xf7\xd2\x92\x81?\x95\xa6\xa3\xf1\x11\xab\xa8', 0x0) 14:58:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:50 executing program 0: r0 = socket(0x2, 0xa, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000080)) 14:58:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x54) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) 14:58:50 executing program 4: openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff]}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000280)={0x3ff, 0x0, 0x4, 0x0, 0x3, {}, {0x2, 0x8, 0x8, 0xff, 0x1, 0x2, "0056ae04"}, 0x3b8a, 0x0, @planes=0x0, 0x401}) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x8e182) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) [ 542.531816] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 542.531816] 14:58:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@private0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, 0x3ff}) 14:58:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x6, &(0x7f0000000100)=@framed={{}, [@generic={0x3}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xd3, &(0x7f00000001c0)=""/211, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @dev}}) 14:58:50 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$inet(r0, &(0x7f0000005140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:58:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00', r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x134, r1, 0x607, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x106, 0x1, '\n\x80\x03l\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\x00CR\xf6)bs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1SY\n\xfbn\xbe\xb1\xbef\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd5\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback=0x7f000003}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}]}, 0x134}}, 0x0) 14:58:50 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000180)={0x1d, r1}, 0x10) sendmsg$can_bcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x1, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "50982bb3cdbb771a"}}, 0x48}}, 0x0) sendmsg$can_bcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1, 0x0, 0x0, {0x0, 0xea60}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "7a7ae37d4bd4560d"}}, 0x48}}, 0x0) 14:58:50 executing program 0: r0 = socket(0x2, 0xa, 0x0) bind$alg(r0, 0x0, 0x0) 14:58:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5421, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x32}, 0x1}, 0x80) [ 542.766040] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 542.800760] EXT4-fs (loop5): get root inode failed [ 542.816847] EXT4-fs (loop5): mount failed 14:58:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5452, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 14:58:50 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000040)={0x2, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x202, @private1, 0x6}}}, 0x108) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000180)=0x4, 0x19) pipe(&(0x7f0000000040)={0xffffffffffffffff}) accept$phonet_pipe(r2, 0x0, 0x0) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000040)={@private1, r4}, 0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'syztnl2\x00', r4, 0x29, 0x1, 0x9, 0x2, 0x4, @private2, @mcast2, 0x8, 0x20, 0x2}}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@local, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', r5, 0x29, 0x5, 0x4, 0x8001, 0x12, @private0={0xfc, 0x0, [], 0x1}, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x20, 0x5, 0xeff}}) 14:58:51 executing program 4: openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff]}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000280)={0x3ff, 0x0, 0x4, 0x0, 0x3, {}, {0x2, 0x8, 0x8, 0xff, 0x1, 0x2, "0056ae04"}, 0x3b8a, 0x0, @planes=0x0, 0x401}) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x8e182) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) 14:58:51 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/mnt\x00') 14:58:51 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}, 0x10000}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=[@flowinfo={{0x14, 0x29, 0xb, 0x2}}, @hopopts={{0x18}}, @flowinfo={{0x14, 0x29, 0xb, 0x6}}], 0x48}, 0x0) 14:58:51 executing program 2: setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000000), 0xfffffffffffffdd4) 14:58:51 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 14:58:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 542.974362] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 542.986548] EXT4-fs (loop5): get root inode failed [ 542.993484] EXT4-fs (loop5): mount failed 14:58:51 executing program 1: socket(0x3, 0x0, 0xffffffff) 14:58:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x9, 0x4500, &(0x7f0000000200)=@raw=[@ldst], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:58:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @dev}}) 14:58:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 543.136392] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 543.163426] EXT4-fs (loop5): get root inode failed [ 543.169354] EXT4-fs (loop5): mount failed 14:58:51 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x44090) 14:58:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x54) sendto(r0, 0x0, 0x2, 0x0, &(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) [ 543.317236] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 543.317236] 14:58:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x4, 0x4, 0x80000001}, 0x40) 14:58:51 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$IMCLEAR_L2(r0, 0x80044946, 0x0) 14:58:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x13}, 0x40) 14:58:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(0x0, r0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="9bb729c2389d2180895301"], 0x60}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', r0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x2000c805}, 0x804) 14:58:51 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r0, &(0x7f0000000280), 0x10) 14:58:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'syztnl0\x00', 0x0}) 14:58:51 executing program 4: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(r0, 0x0, 0x0) 14:58:51 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 14:58:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x54) sendto(r0, 0x0, 0x0, 0x20004110, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) [ 543.654856] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. [ 543.678761] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 14:58:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:52 executing program 2: bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0}, 0x38) 14:58:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5452, 0x0) 14:58:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@private0, 0x0, 0x1, 0x0, 0x5}, 0x20) 14:58:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a0, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 14:58:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x80108906, 0x0) [ 544.125834] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 544.125834] 14:58:52 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff}) write$cgroup_devices(r0, 0x0, 0x0) 14:58:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000080)=0x5, 0x4) 14:58:52 executing program 0: socketpair(0xb, 0x0, 0x0, &(0x7f0000000180)) 14:58:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x11, 0x0, 0x0) 14:58:52 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4000, 0x0) 14:58:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8982, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) [ 544.344321] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 544.380960] EXT4-fs (loop5): get root inode failed [ 544.391624] EXT4-fs (loop5): mount failed 14:58:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x14c, 0xffffffffffffffff, 0xfffeffff}, 0x40) 14:58:52 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:58:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001380)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:58:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@loopback}) 14:58:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x54) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) 14:58:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={[], [], @empty}, @loopback}}) 14:58:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000400)) 14:58:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8904, 0x0) 14:58:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8943, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 14:58:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x54) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) [ 544.563560] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 544.599167] EXT4-fs (loop5): get root inode failed 14:58:52 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f00000000c0), 0x4) [ 544.611406] EXT4-fs (loop5): mount failed 14:58:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:52 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 14:58:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4, &(0x7f0000000080)={@private0}, 0x20) 14:58:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @empty, @private2}}) 14:58:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x48, &(0x7f0000000080)={@private0}, 0x20) 14:58:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5451, 0x0) 14:58:52 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000003c0)={'gre0\x00', 0x0}) 14:58:52 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 14:58:52 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) [ 544.807094] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 544.821600] EXT4-fs (loop5): get root inode failed [ 544.840880] EXT4-fs (loop5): mount failed 14:58:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000000640)=[{{&(0x7f0000000100)=@in6={0xa, 0x1000, 0x0, @remote}, 0x80, 0x0}}, {{&(0x7f0000000440)=@in6={0xa, 0x4e23, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000600)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x18}}], 0x2, 0x8000010) 14:58:52 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=[@flowinfo={{0x14}}], 0x18}, 0x0) 14:58:52 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 545.006455] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 545.006455] 14:58:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x894c, 0x0) 14:58:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, r1}) 14:58:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x6, 0x0, 0x0, 0x0) 14:58:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8901, 0x0) 14:58:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @private0}}) 14:58:53 executing program 0: socketpair(0x3, 0x0, 0x800, &(0x7f0000000580)) 14:58:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5421, 0x0) 14:58:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}) 14:58:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x13, &(0x7f0000000080)={@private0}, 0x20) 14:58:53 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 14:58:53 executing program 1: socketpair(0x10, 0x0, 0x0, &(0x7f0000000380)) 14:58:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)={0x14, 0x2a, 0xb8ad293640886565, 0x0, 0x0, "", [@generic=' ']}, 0x14}], 0x1}, 0x0) 14:58:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001340)={'sit0\x00', &(0x7f00000012c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2}}) [ 545.828436] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 545.828436] 14:58:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000180)={0x1d, r1}, 0x10) sendmsg$can_bcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000a00)={0x1, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "50982bb3cdbb771a"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x8000002, 0x0, @loopback}, 0x1c) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000001c0)) socket$inet6_tcp(0xa, 0x1, 0x0) getpid() getuid() sendmsg$can_bcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x3, 0x0, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @can={{}, 0x0, 0x7, 0x0, 0x0, "7a7ae37d4bd4560d"}}, 0x48}}, 0x0) 14:58:53 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f0000000080), 0x80, 0x0}, 0x22) 14:58:53 executing program 4: socketpair(0x29, 0x5, 0x50a8, &(0x7f0000000000)) 14:58:53 executing program 0: socketpair(0xa, 0x6, 0x0, &(0x7f0000000280)) 14:58:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001580)=ANY=[@ANYBLOB="6c1200002d0065"], 0x126c}], 0x1}, 0x0) 14:58:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) [ 546.043260] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 546.089704] netlink: 4680 bytes leftover after parsing attributes in process `syz-executor.4'. [ 546.105447] EXT4-fs (loop5): get root inode failed [ 546.117269] EXT4-fs (loop5): mount failed 14:58:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:54 executing program 0: socketpair(0x15, 0x0, 0x0, &(0x7f0000000740)) 14:58:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x54) sendmmsg$inet(r0, &(0x7f0000001b40)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0}}], 0x1, 0x0) 14:58:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x54) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x32}}, 0x80) 14:58:54 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "9c9dde1dfc5e1f0f38946484bb3da7eee911dbf015f98dd550c9010308911100d1dd1d07892df390ef755eb9e94f48fd3c9d7f84a0d6921b35c50fa02db3a4"}, 0x60, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="c9"], 0x10}, 0x0) 14:58:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x54) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x1000}, 0x80) 14:58:54 executing program 0: r0 = socket(0x11, 0x2, 0x0) connect$bt_rfcomm(r0, 0x0, 0x0) [ 546.306575] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 546.345287] EXT4-fs (loop5): get root inode failed [ 546.350952] EXT4-fs (loop5): mount failed 14:58:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x11, 0x3, 0xff0a, &(0x7f00000002c0)) 14:58:54 executing program 2: r0 = socket(0x11, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000021c0)={'wg1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', r0) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00', 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={0x0}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e20}, @WGDEVICE_A_IFINDEX={0x8}]}, 0x24}}, 0x20044012) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', r5) sendmsg$BATADV_CMD_GET_HARDIF(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 14:58:54 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000640)='ns/cgroup\x00') 14:58:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 14:58:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005e40)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000005e80)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r1, &(0x7f0000005f40)={0x0, 0x0, &(0x7f0000005f00)={&(0x7f0000005ec0)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8}]}, 0x24}}, 0x0) 14:58:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4b, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) 14:58:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x6, 0x20, &(0x7f0000000080)={@private0}, 0x20) 14:58:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:54 executing program 0: ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000000240)=0x7) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={&(0x7f0000000000)="14303b33bb34dedd36c6fb69706a5b203265f7ebfe59a30d84c4b255ccea587f165d7f2741568f2fb5c83c3ce1e0b0e4e05e84674cdd7d51a57019211e5b6576b23134f885ae02884c909b0a663a3d5d6becb6f0203a7498bede3605ee39a7bd6d938d4fc53c0af8c38e9400a8b4ead9f65edf781acf1e5f42c14108467db42778cbd7d5d9aee506fe503855db69d4198d0882a7751b76dba88aecb6bf4c19ca6e07d5b37271fb006bb65887b048d94fce2162c8d6006c2e7c1cf149f20f1fa2c82f96c9ee8654ed1cda2eba1f72de6828b171a1c99bd447b6", &(0x7f0000000100)=""/25, &(0x7f0000000140)="7bc1e435837f4009379eecca8ee1baa6d1a8391d95ed70ae190dbeece944d3ee928fbe4d4348617e373f8b8821e885ef214867e935aa2cffa3924656d82756b1a9a9e94e7cd95871837bb4dd611e1cae902c2d982b5c2333ea24eab2d517b8ab0f98", &(0x7f00000001c0)="80fe67e287a40d2cf90aedbf56c84e4ee0", 0x6, 0x1, 0x4}, 0x6e) [ 546.914368] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated 14:58:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x541b, 0x0) 14:58:55 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xd3, &(0x7f00000001c0)=""/211, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:55 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r0, &(0x7f0000000000), 0x10) [ 546.954919] EXT4-fs (loop5): get root inode failed [ 546.970482] EXT4-fs (loop5): mount failed 14:58:55 executing program 2: pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(r0, &(0x7f0000000000)={'a', ' *:* ', 'rm\x00'}, 0x9) 14:58:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x0, 0x0, 0x80000001}, 0x40) 14:58:55 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @private0}}) 14:58:55 executing program 4: bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080), 0x4) 14:58:55 executing program 1: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000014c0)={'ip_vti0\x00', &(0x7f0000001440)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) 14:58:55 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) 14:58:55 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, 0x1c) [ 547.151424] EXT4-fs warning (device loop5): ext4_multi_mount_protect:321: MMP interval 350 higher than expected, please wait. [ 547.151424] 14:58:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 14:58:55 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000600)={'vxcan0\x00'}) 14:58:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8904, 0x0) 14:58:55 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000001b00)={0x2, 0x0, @multicast1}, 0x10) 14:58:55 executing program 2: setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f00000011c0)="8511bbf77bcc90041f50452220630e32fd9f373c7dfd08375b72dc2d3d700a4f47d5a42415b84aed017e3c1eb92ce7bd7287aca9fd1a349c413c9655382747fa7ba587993ca27c9da1db6697de4efb5a543df2c21fc8e17e93b7c5d0f3c4dce6baaa00db614a9e57f10b14f82d67fffbbb23550b8d8ae33728694658a4ca52c782a121c1e349cb67f8d20e", 0xffffffffffffffcd) [ 547.373687] RDS: rds_bind could not find a transport for 224.0.0.1, load rds_tcp or rds_rdma? 14:58:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052", 0x61, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8901, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 14:58:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) 14:58:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @private0, 0x0, 0x1}}) 14:58:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000200)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0xec1) 14:58:56 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f0000000040), r0, 0x0, 0x7fff, 0x0) [ 547.965872] EXT4-fs warning (device loop5): ext4_multi_mount_protect:325: MMP startup interrupted, failing mount [ 547.965872] 14:58:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_SCAN_REQ(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01e5f9000000000000000900008005"], 0x24}}, 0x0) 14:58:56 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={0x0}}, 0x0) 14:58:56 executing program 1: bpf$MAP_DELETE_BATCH(0x15, 0x0, 0x0) 14:58:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x54) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback={0x0, 0xf}}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff}) accept$phonet_pipe(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x4, 0x0, 0x1f, 0x5, 0x4, @private0, @dev={0xfe, 0x80, [], 0xa}, 0x0, 0x700, 0x3, 0x8}}) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_getneigh={0x50, 0x1e, 0x610, 0x70bd2a, 0x25dfdbfc, {0x7, 0x0, 0x0, 0x0, 0x2400, 0x104}, [@IFLA_OPERSTATE={0x5, 0x10, 0x3f}, @IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}, @IFLA_GRE_ENCAP_TYPE={0x6, 0xe, 0x3}]}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004090}, 0x2004c850) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00'}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept$phonet_pipe(r5, 0x0, 0x0) accept$phonet_pipe(r4, 0x0, 0x0) connect(r3, &(0x7f0000000000)=@isdn={0x22, 0x99, 0x9, 0x40, 0x2}, 0x80) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000340)={@mcast2, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f00000003c0)={'syztnl1\x00', r7, 0x2f, 0x4, 0x1f, 0x2, 0x8, @remote, @loopback, 0x1, 0x20, 0x5, 0x29}}) 14:58:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891d, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 14:58:56 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x26) [ 548.107868] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 548.201461] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 548.231805] EXT4-fs (loop5): get root inode failed 14:58:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052", 0x61, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:56 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x24, @long={0x3, 0xffff}}, 0x14, &(0x7f0000000540)={&(0x7f0000000500)="01", 0x1}}, 0x0) 14:58:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000), 0x8) 14:58:56 executing program 0: socketpair(0xa, 0x6, 0x46, &(0x7f0000000280)) [ 548.252581] EXT4-fs (loop5): mount failed 14:58:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) 14:58:56 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x10, 0x0) 14:58:56 executing program 4: r0 = socket(0x2, 0xa, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0xaf75) 14:58:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="9bb729c2389d2180895301"], 0x60}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240)='ethtool\x00', r0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) 14:58:56 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0xfc9e) 14:58:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_SCAN_REQ(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01e5f90000000000000009"], 0x24}}, 0x0) 14:58:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x54) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5421, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 14:58:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_deladdr={0x18, 0x15, 0x1}, 0x18}}, 0x0) 14:58:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052", 0x61, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 548.453043] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated [ 548.466612] EXT4-fs (loop5): get root inode failed [ 548.475893] EXT4-fs (loop5): mount failed [ 548.573362] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 548.594665] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 14:58:56 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x100401, 0x0) 14:58:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x54) sendto(r0, 0x0, 0x0, 0x900, &(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80) 14:58:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000040)=ANY=[@ANYBLOB="c00000b6"], 0xc0}}, 0x0) [ 548.624296] EXT4-fs error (device loop5): ext4_fill_super:4365: inode #2: comm syz-executor.5: iget: root inode unallocated 14:58:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 548.679121] EXT4-fs (loop5): get root inode failed [ 548.688389] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 548.707555] EXT4-fs (loop5): mount failed 14:58:56 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x8}, 0xc) 14:58:56 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x10, &(0x7f0000000080)={@private0}, 0x20) 14:58:56 executing program 0: r0 = socket(0x11, 0x2, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 14:58:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname$packet(r0, 0x0, &(0x7f0000000100)) 14:58:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0x4, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000680)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 14:58:56 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) 14:58:56 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={0x0, 0x0, 0x4}, 0x10) 14:58:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:58:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000000c0)=@routing, 0x8) 14:58:56 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x8}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x2]}, 0x8}) [ 548.872185] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:57 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)) 14:58:57 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x2]}, 0x8}) 14:58:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x54) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x80) 14:58:57 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @dev, 0x7, 0x7}}) 14:58:57 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 14:58:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x2c}}, 0x0) 14:58:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) [ 549.060678] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 549.098336] print_req_error: I/O error, dev loop5, sector 0 14:58:57 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xec02c83536180437, 0x12, r0, 0x0) [ 549.104127] Buffer I/O error on dev loop5, logical block 0, async page read [ 549.113040] print_req_error: I/O error, dev loop5, sector 4 [ 549.118883] Buffer I/O error on dev loop5, logical block 2, async page read [ 549.126039] print_req_error: I/O error, dev loop5, sector 6 [ 549.132192] Buffer I/O error on dev loop5, logical block 3, async page read 14:58:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 14:58:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x2f5530}], 0x8, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x0, 0x3f00}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7c, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="050300c806023e0001d841a0c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x40ed) 14:58:57 executing program 2: r0 = socket(0xa, 0x3, 0x3) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, 0x0}, 0x2000) [ 549.214893] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:58:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, 0x0) [ 549.373548] print_req_error: I/O error, dev loop5, sector 0 14:58:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000dc0)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000cc0)={0x50, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_FRAME={0x34, 0x33, @deauth={@with_ht={{{}, {}, @device_b, @device_b}}, 0x0, @val={0x8c, 0x10, {0x0, "62fe49bd661f", @short="3d7ed42115e1fea9"}}}}]}, 0x50}}, 0x0) 14:58:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, 0x0) 14:58:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', 0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0xfb], 0x10e00c}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x200102}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:57 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000005100)='net/ip6_tables_targets\x00') write$tun(r0, 0x0, 0x0) 14:58:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) 14:58:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x3, 0x1, &(0x7f0000000180)=@raw=[@exit], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:58:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, 0x0) 14:58:57 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x20, 0x0, 0x0, 0x3}, {0x6}]}) [ 549.938092] print_req_error: I/O error, dev loop5, sector 0 14:58:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000980)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x49, 0x0, {0x0, 0x0, 0x5}}, 0x14) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000800)={[0x0, 0x1, 0x101, 0x0, 0x0, 0x0, 0x20000000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:58:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f}) 14:58:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001b00)=@security={'security\x00', 0xe, 0x8000000, 0x2e0, 0xffffffff, 0xf0, 0x2b8, 0xf0, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'ip6erspan0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x340) 14:58:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1\x00', 0x109841, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000000080)=0x9b9) read$dsp(r3, &(0x7f00000001c0)=""/180, 0xb4) write$dsp(r2, &(0x7f0000002000)='`', 0x80000) 14:58:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000180)=ANY=[@ANYBLOB="07000000000000000d00000001"]) 14:58:58 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000024c0)=[{&(0x7f0000000300)="eea0bb5304fb1d49cb73", 0xa}], 0x0, 0x0) 14:58:58 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[], 0xfd45) 14:58:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}}], 0x1, 0x0) [ 550.305336] kvm [683]: vcpu0, guest rIP: 0x14c ignored wrmsr: 0x11e data 0xff86 14:58:58 executing program 2: add_key$user(&(0x7f0000001440)='user\x00', &(0x7f0000001480)={'syz', 0x3}, &(0x7f00000014c0)='2', 0x1, 0xfffffffffffffffd) 14:58:58 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x453, 0x0, 0x0, 0x0, "e5"}, 0x14}}, 0x0) 14:58:58 executing program 0: r0 = socket(0x23, 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 14:58:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8970, &(0x7f0000000500)={'syztnl1\x00', 0x0}) 14:58:58 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) [ 550.523927] audit: type=1107 audit(1618844338.482:82): pid=719 uid=0 auid=4294967295 ses=4294967295 msg='å' 14:58:58 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x6, r1, 0x0) 14:58:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x60}, 0x300}, 0x0) 14:59:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x5865}, 0x0) 14:59:01 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x7fba8c77eb436741) 14:59:01 executing program 2: syz_mount_image$gfs2meta(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00'}, 0x10) 14:59:01 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 14:59:01 executing program 3: r0 = socket(0x23, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000001ac0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0x0, r2, 0xee00}}}], 0x20}], 0x1, 0x0) 14:59:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=@ipmr_newroute={0x3c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP={0x3, 0x16, 0x0, 0x1, @SEG6_LOCAL_NH6={0x14, 0x5, @empty}}, @RTA_OIF={0x8}]}, 0x3c}}, 0x0) 14:59:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x894a, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000400)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @dev}}}}) 14:59:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback, 0x5}], 0x1c) 14:59:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x2a, 0x9, 0x80000001}, 0x40) 14:59:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8953, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) 14:59:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='r', 0x1, r2) 14:59:01 executing program 5: bpf$MAP_CREATE(0x14, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 14:59:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 14:59:01 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 14:59:01 executing program 2: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0xe46531691b9af60f) 14:59:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000034c0)={0xa0000001}) 14:59:01 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89a0, 0x0) 14:59:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x8, 0x4, 0x6, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 14:59:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg1\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000000)={'ip_vti0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="10000000110089"], 0x60}}, 0x0) 14:59:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5452, &(0x7f0000000500)={'syztnl1\x00', 0x0}) 14:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="abf2da1e0cfcaa13ad5ada1c667eeb8c6082f6d3e6824802cf0e5768b7a45b5a6887df83c4c108937e64fc1b5fcb1d9c68a1efe8b12aaadcda4a65bbd0481f9eeed807a124bdf443dc1406d4fc2b49d4af76fcb3fa41c5f4bd4dd4d43fbb9d5b06dc9a6e05cf8e7220", 0x69, r0) 14:59:01 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x4, r1, 0x0) 14:59:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0xe) 14:59:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="abf2da1e0cfcaa13ad5ada1c667eeb8c6082f6d3e6824802cf0e5768b7a45b5a6887df83c4c108937e64fc1b5fcb1d9c68a1efe8b12aaadcda4a65bbd0481f9eeed807a124bdf443dc1406d4fc2b49d4af76fcb3fa41c5f4bd4dd4d43fbb9d5b06dc9a6e05cf8e7220", 0x69, r0) 14:59:01 executing program 0: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 553.646607] encrypted_key: master key parameter '' is invalid 14:59:01 executing program 4: socketpair(0x2, 0x2, 0x9b, &(0x7f0000000740)) 14:59:01 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)) [ 553.757387] encrypted_key: master key parameter '' is invalid 14:59:01 executing program 3: syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000080)=']', 0x1}, {&(0x7f0000000140)="a6", 0x1}, {&(0x7f00000011c0)="e9", 0x1}], 0x0, 0x0) 14:59:01 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x1000) 14:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="abf2da1e0cfcaa13ad5ada1c667eeb8c6082f6d3e6824802cf0e5768b7a45b5a6887df83c4c108937e64fc1b5fcb1d9c68a1efe8b12aaadcda4a65bbd0481f9eeed807a124bdf443dc1406d4fc2b49d4af76fcb3fa41c5f4bd4dd4d43fbb9d5b06dc9a6e05cf8e7220", 0x69, r0) 14:59:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) 14:59:01 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'gre0\x00', &(0x7f00000006c0)=ANY=[@ANYRESHEX]}) 14:59:01 executing program 4: bpf$MAP_CREATE(0x8, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 14:59:01 executing program 0: socket(0x2b, 0x1, 0x7) 14:59:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000940)={0x1, 0x0, 0x0, 0x0, 0x600}, 0x40) 14:59:01 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x11}, 0x0) 14:59:02 executing program 5: pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x7) dup3(r0, r1, 0x0) 14:59:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="abf2da1e0cfcaa13ad5ada1c667eeb8c6082f6d3e6824802cf0e5768b7a45b5a6887df83c4c108937e64fc1b5fcb1d9c68a1efe8b12aaadcda4a65bbd0481f9eeed807a124bdf443dc1406d4fc2b49d4af76fcb3fa41c5f4bd4dd4d43fbb9d5b06dc9a6e05cf8e7220", 0x69, r0) [ 553.976114] encrypted_key: master key parameter '' is invalid 14:59:02 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) [ 554.114538] encrypted_key: master key parameter '' is invalid 14:59:02 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e7, &(0x7f0000002400)) 14:59:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x2}, 0x0) 14:59:02 executing program 5: bpf$MAP_CREATE(0xa, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 14:59:02 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) write$binfmt_elf32(r0, 0x0, 0x0) 14:59:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20044081) 14:59:02 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/ocfs2_control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, 0x0) 14:59:02 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x10, 0x464, 0x4}, 0x10}}, 0x0) 14:59:02 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="c6", 0x1, r0) 14:59:02 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vim2m\x00', 0x2, 0x0) 14:59:02 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x8983, &(0x7f0000002400)={0x7d}) 14:59:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @multicast2}], 0x10) 14:59:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$alg(r2, 0x0, 0x0) 14:59:02 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x541b, &(0x7f0000002400)) 14:59:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_LSEEK(r0, 0x0, 0x0) 14:59:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x10, r1, 0x0) 14:59:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x2a, 0x9, 0x80000001, 0x4}, 0x40) 14:59:02 executing program 1: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:59:02 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0xc0189436, 0x0) 14:59:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) 14:59:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x16, 0x0, r2) 14:59:02 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10}, 0x10}}, 0x0) 14:59:02 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) 14:59:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x0, 0x0, 0xffffff7f}, 0x40) 14:59:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000780)=@ipv4_delroute={0xfffffffffffffec5, 0x19, 0x0, 0x0, 0x0, {}, [@RTA_IIF={0x8}, @RTA_GATEWAY={0x0, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_FLOW={0x8}, @RTA_DST={0x8, 0x1, @multicast1}, @RTA_ENCAP_TYPE={0x6}, @RTA_ENCAP_TYPE={0x6}, @RTA_METRICS={0x1004, 0x8, 0x0, 0x1, "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"}]}, 0xffffffffffffffc4}}, 0x0) 14:59:02 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) 14:59:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0xe, r1, 0x0) 14:59:02 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x0, [@null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 14:59:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='`'], 0x60}, 0x300}, 0x0) 14:59:02 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0x1001) 14:59:02 executing program 0: migrate_pages(0x0, 0x1, 0x0, 0x0) 14:59:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0xb35}, 0x10}}, 0x0) 14:59:02 executing program 2: add_key(&(0x7f0000001200)='big_key\x00', 0x0, &(0x7f0000001280)="0080b578cca0f3b95b45d24dd8c4fec71cb596ed7b5d38de188936ed591927fbe002cf2ce091d0ccdc7d13f8aba70cecab310e700a9e30d452894081b7d162ed98bff3b44695f42a45891f05b5cdff1c8d6614e755cbc2d8f19f0db0a1834f5012034f0583974aa881f7500d367fea7887ee5836a8a91ce013bf41bd560545d90d837f0e4922ac1b28486ea11221ad33c3812e9606027d5fbefeccf4dae9149ca36501418d3199d3f2be4a4c70469e96fc52b51c38f5a64d2c7a5d825f36b12b2ecbd4d6d6167362686dd29a6a26c303daebe87b8514f190c8f89b5b754d12997b5a46938df329f8116779cfd3ea670f8236742ca6a0d7ae71143dbee5b818a8fd22b816950944567a3ef3f4c5f70c473a7743b54ac7bf92f217dda03c96c226f0fc655091ab15ac5e05a699f91871891b3380f71b70c193bddd23af6bc08c302118f5f9fe026e380c4398b4e2d0331dcbe5991a79fdf70ff0a40171818c479116bf95b67add29bbfc3ee92693d3bd4b8b2a68301eacd4aa92ca530804187ba5e1043d1ece51983625cbe6f73cf8e928188f1806b66232fa0d74c331acd6bc7c945323aed5099c9d60b4356f054eaa3c0caca9960d773d26fb4c11a6aa5a857bc21c345262cb9870227af57d62db58e49da7fdbe1b69c3d095c069053aa7daa67226287127f851cbe34c7b0b218ef2a72ae15c037fae2e000d2048751fb0966a6f680ba88e210d917fafb4d40be6c9e1993caecb0131f6c0d7d85bfe2cee75aa5162a70d7ed927a4c4ef5a1dc0ad093df282c306b4836a09afd47528aaeac8406da4b0aa917fc8eeda001fdd89f514300afc21bd6a6a288818285f0da4a8b6339d805d65bb6db75354c2f2d9367f536447acac1113b2bb4245322c423fbace9e4d5a5648c1ef79b027a6c2feb0100427d6ef7547bdfe26ebc0664d9dc89fe681e70b435e9caa8d77832d7978ffacf34ae2a83a797997e28d3c6e65d7f2549ebc3f5bb22d2d581fbf1d4b59482595d20c691b52dcfc7facab2f64374c82a8b565671db547e1c785eb1804617c26e7da9e28a0bc2f74a5570fcaaf4055f5352a950c2c23e935198120be586db9bbbe4692bd2584439d346e3a0bdc31130abc12f8ac6d1284e174945e2eaa73c525f0f250953add2d227069ef9c5f4ad06ad3478597391550f9dd7c7b7029a4491311f94a76e2d0564a692d390317be0495a29d1252c212b7c7afc1a2c70c1c2404b1f0f0abe035a82c7affa96b31622e70f8a54461acfd3dbd285f1a47ebcb255bb143ead2cd5272b88383378e4a552dbf3c41263fcbe9744a2b37322e591a2f6dfbbcb1668126bc5c93b97d1c859efa05473e0909785eb556a353decb2694f9aab0a02ae6a78cd0da0202b18a70545e61a13ab411a639212e95b6d177155b74456cd0cdf580246ca913c29260dc360e53e3646ff14b4e91391042b8c4001f46a3a0713741b5c23060733f7d6dd0fe1713413909aff277e70f36a491b5015994ef63a1b09faa2c2eeda444291e98afad6d00966576beac0425743c4c3b186b6c5e5c7a7166f43d95fe27de899cb99ec3f9a97c69b2828a5f7858faade9b8eccaeb5e83374e008d14e9bd6f997b230b48137a5c425253eeb481531fc499c64e23dc793698c624b3b1c127320fefbc14750f23f1b18e8378e3f181715d37ad28df23d36d4b22618953de72b4505a8d66bfd8242f5a31c4e6e12913e70e400e5fd47958ac85b6b58a726712e59810f868d4b4794fee843def4ec053b32a574c6f056f66c810a386eef62055807737c5b324132bedb8d938dfc017368b45bfd95536bb472e46172cc4c8291b9e7f2629d7129a425cb193f3e2f08980325cc9c71924ace54ea32401cf7467bbe2d4f6ed4ddc3ca4c909cd55f10df672905d2d8015d694479ebf0632ee21aa7d8306fc7c6e61a289f1869e89dd72af80489ce109725a823f3c3a8e37c62894e69206891accf786fe562fa461846f887d1c9d43eee9313806caf27d30801125eb43bc23e396b8f623feced2dc74ac8f3da3a33993062886096e68935edac34c1ebb7575f6b2bd81c0e5bf0d35195002a0157b5c77b26b70c814da3b676c135c29bd523fa23dcfcd1f9d0d32b3f3479bc72d2d83dc1dc485f76322bcd7afa8d1438a4175ad7a2e41b08c08dc8cfa38215888aed052f4211fd0dc543900f53c53d1b4a7cb5dd35a7df95037bf76e11b6c7cf96aa5bb2281c33b6c43581fc4bcf28c31bccd1e257ac6e6995f495d23fd091e8d5aea516193480d72be89f1c19a21b805f039638f68baf8b6900a55c42732ed3548061cc2110114c1333c61ba3ee5eefdb56de021859cbb48eb2c061fd65e39784708e3aebb5a28aef6d9d18f7213cda63b36f29c5631cf6c41b12a35a68561387fd48f50f515719565c20f7273d46dc73f5cd857ffd2037221ea1ebe521b47cca42d61c19d1c04f834c09b49020e7239919e68c0c6e6cd0b672e291cee677ced56188dc6194803b86332e565b56eced61cea98512de877a9f1a534baa02943a1c2ef9d8c9d02aefcae6a65e0d9abd6a8e33c3712cd454f2b0e1820e21f4f3bdff4b62a324db32a7e07ed49e9492e51140a620e90d6fb1329f180476d8510a6b689093d2395e08ef73de6385344538995c51f9d7575be36c64cf769b1d8d1acfec4ca8e994aafe83fcebccf1eed43d06c5c72dd2f5d545ec554271f5243be184bc67d8604ce6bea5e6cedfb7a8692410d6e3456c0eb6024317b4bcbde85e5a42bd4bc4bc8319dcf8e72739f4bdf23096735fb42f1f27f07f733efa08221f31c0aa949ce33d93f0e3d0159b1465238ad4e55bef959489c73349c95450ad27f2a107c808799f9cdb0bf8897ae3a41d9aa38113aaf46bd3c47d18a40a791f5f2127110aff0c0d83656df3c507ff807bfe4b817b9a15b0d5ee86e0ae483b6e379c151055aefa383955a2a667585333e480d8e1f97f4f9ff6d5038b0bbe09085105b7e98e67fd316ce5e35e6c82fef3ec99ae72c36836c64466d97d3cae171759cdb38661813be95469b8b004ceca505aa8554c9229de91743001fff459dea8a6a3d3b1218945ff299c1a11d73ebdc45cff0d519e4a300cab4054aa8ca11f984a51f9bf8bf95e908f9d2e2ba6d0d65003dea9565374bb3822a545f99c738c77dcc59516e51be54f207403a3494a9de6810f0d278896a54cf9488fa69087887a58cb1f556396db4b3704a690e6e24b71e9f2566466f1cdecac939f170b2cd55c0a2112a0da18ba45c2ed2ad949ab31a6662ba51cde806ef92dca978ca5b0ed1144f8b88e5787a3f7812561c2ea52d86c456b352f06d1ab58950a1c1589091739aba3663a6ad5d0d410225b46a962096ff53e777693138acbb8d7850db1a83d019816a5dd6cac2206e13421b0238abba1d4b45bf749d2ae103e571a9a4212e0bf54189790af354eb9c42c2080c492fe718db7f479d21a86b5b05c2b32165e070eceb8679df560838e159ac4230e11d554c0d3ae5ba95350ba73fc01eda241fe637ac3baf5ff4d195636b69231c68e5260a4e39b5c34c801ca950cc946253e6ed9d805bb74ffe8e38bfb9f3f5e76483ff19e69a1f29adf95915d7a1c6b5d94da99dc2cbf92291374d7c9a58ab6510fdac78c90a472650927e246326059c341cd40d836d639b9c1be02ea019aad17ba1610ac29de147ded1c2dbeb47f3b173b0ff05ef662fd2780613823a0f295907cbd24c45f3489e55f31a4a89d4b0f41128158811c4f72759f111e3126db5a05a138b90fe3a81167825d07e56814d0086ef8f34de9d4a196441ad765d10d71f29546d5402cfa810feec5358ec7a73c3edd9b5f7745a182e1df4be3aba3ba87c51551f3987d2b2af62c26c7e4ef17f0d115293f22846a1fdce53cb5143cac06bc6c92590bc0004d1fddde8d8648a6969b9536f9047894ccd58ac73b56bf2ea074d2f2bbd8d56749cf3ff59edc4039cbff85e07a4398192debf960252e7ba5b33c23f4de7875830316d45ba77d0f9f1739ed77b79d21a7898e4a48485649e5a9a461384e5fe56e5ed06f0ea75b69b82b2490247edbbb7f41ab493853225555661d52ace9f2b55ad9eef56d0ddbb2b80db265c8b755e6f00e929fa50491c36684aa72b8e78436392df2e4983ed8c8b3710af2c27da1b871ffa90b79de3d473aff22d0cb3e5e8318eb83419cafd181f6868b19cef288b6676566e0c2e567da0e409e483d908deebc44967cab04cb30a17c300216ea1a4e4a97c72833180c06af3b7b9cc6fdf37e7bb3e28af57b0c3ec6ee19ad2bf661a360af725e8792b9a6c97b298a06c4b0f8f276e76c40779781e134fe8be1c16430635cba42be0b39907337ddd4eaa14df1e3c2714ca3e411206948053a876f92236b7240202a825e1f4155a58c4e2c9b287dec419004ed551f900ae8134b00540b5a6e47c3fafa468ac82e735491c2d87dae0a1140ea85dd3eb0a2fae7fc8916a25773ed63cd26a35679190d9d2d5547fa596507ba71eb46f22d39d677c3911e6a7ff2efb0e772406375cb2b21137e978fdcefecc5393892ac82423a32d11a34c170407be489c040d4178703383e9351bd304cc498856b82b2e95f631fa0ceacdd6131d3a78adc3b968ab72d78bb16ddb26fa21a2430288010e6a79a748014d7c82011f80d526b4c09b0b98360727c136c34609e4794065a50d2f848c4d98e0a627be446235ffc1b5219b65a407f8a3e9f6b6988e11a92ea4191445d07040d35b801c0a7adf1c810cd3725b4a783933fa2708b501ebdb0db04a5dcfadc8542a53ff5536718cb6b9c73b004edeacf13e5cb55299e3d62c73a7056b7b453ded55af19b9a037166190172f1fcd6ffb664fe99a56e58491b3a36426da2f68544ca76ff73e7af5002c8353cabc19b1ec613767cc95051fe5832ebf89eaa6b5f9fef3a16c1783915286b8de8129fa4e71cc3df8f9b6f35d8f2558308e1d9fccbef948a51cbc2dc69ad273ee94793c22bf734f4e60b54166be653a4ef1795a9efe65cdf4fa208bd94026d7fbb10197855a2de97f0b3a35384ad33ed32903bc34262fb228ac19b41513cfbe068a171408655677cc6a71250f1381b2cbcce59b8613a99c879373281bc0916a9898d0cd113f4f77bb16be44b9d290df6e7ab40c2d09df5369051f2d9d7a16757947fcf6701a1464ba7a6dccfa78062ed8db8be90cfac334449180f6c4c389c67adb8348caf052cc74eb41ce6a76577497acb07376e6f58986a1be59e72db794977a8033f44a1efe2f4dbc577b44d67e7c54793d4d61f1a2ed0db01144ce89ecda427120efd12786ce810e2b913aaf5aa4e9b0d87a1602366270388d2f30fa5abfc21ff672a11278ed3b6d38d5e54e4296c131e0b95bd159f74d8fb04fdee26c71aba42b6cd6e8decac2f8edde6cca519f20d4a4c497fe7a018412f97dd54fe07f4c9936401e5b4b852c78633d6ccbfaec9b80480e1450244ddf88ab9ebdd73b1a773ebc26388084c281b5156c1e48937802127816138dccfabc353e1ae086517b7912eb1355cb1516af0e03a7dee0bc83a9cc894309fbba8c78bfd001fa39bb4f734030f1049dad2afb290f086df22edf8f2153b80ac4ad4c90f6bcae87f763470907faebaf19f0b08e56bf45c23a67def54a2efb487572fd84832de431fd9dba7da257ea3fa04d573fa693e7714231f246beb65ddd27d7a088214642f2cac789c4b720d4e165ebd1b955bc1ee3d45f819af2874bbe4882702bb662380169a20d53dbe2cc1b9339268c52ae96d30da2f65b51", 0xfff, 0xfffffffffffffffc) 14:59:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000480)) 14:59:02 executing program 1: r0 = socket(0x23, 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) 14:59:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000180)="41aa5e2908ec478c93de8112", 0xc, r0) 14:59:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:59:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$unlink(0x9, r2, 0xfffffffffffffffc) 14:59:02 executing program 5: bpf$MAP_CREATE(0xe, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 14:59:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 14:59:02 executing program 2: socketpair(0x9, 0x0, 0x0, &(0x7f0000000400)) 14:59:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}}}}) 14:59:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$link(0x9, r1, r2) 14:59:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x9, 0x9, 0x4d2c, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x40) 14:59:03 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) 14:59:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000540)={'ip6gre0\x00', 0x0}) 14:59:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8937, &(0x7f0000000500)={'syztnl1\x00', 0x0}) 14:59:03 executing program 2: pipe2$9p(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 14:59:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$alg(r2, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0)=[@assoc={0x18}, @assoc={0x18}], 0x30}, 0x40001) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000001200)={&(0x7f0000001140), 0xc, &(0x7f00000011c0)={0x0}}, 0x0) 14:59:03 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 14:59:03 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, r0) 14:59:03 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) accept4$phonet_pipe(r0, 0x0, 0x0, 0x0) 14:59:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="6000000011008924f0a1", @ANYRES32=0x0, @ANYBLOB="00440100c208000040"], 0x60}}, 0x0) 14:59:03 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x3, r1, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$clear(0x7, r3) 14:59:03 executing program 5: pipe2$9p(&(0x7f0000000e40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000005480)) 14:59:03 executing program 1: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip_vti0\x00', &(0x7f0000000280)=ANY=[]}) 14:59:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002200)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000000340)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0xb8}]}, 0x30}}, 0x0) 14:59:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001580)={0x12, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x40) 14:59:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @remote, @local}}) 14:59:03 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000002a80)={'wlan1\x00'}) [ 555.291958] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 14:59:03 executing program 5: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/ocfs2_control\x00', 0x0, 0x0) 14:59:03 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000002400)={0x7d, 0x0, 0x8, 0x8, 0x4155}) 14:59:03 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000002dc0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000002e00)) 14:59:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000011c0)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)={0x28, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8}]}]}, 0x28}}, 0x0) 14:59:03 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x8903, &(0x7f0000002400)) 14:59:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x3, @loopback}, @in={0x2, 0x4e23, @dev}], 0x2c) 14:59:03 executing program 0: add_key(&(0x7f0000001200)='big_key\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="0080b578cca0f3b95b45d24dd8c4fec71cb596ed7b5d38de188936ed591927fbe002cf2ce091d0ccdc7d13f8aba70cecab310e700a9e30d452894081b7d162ed98bff3b44695f42a45891f05b5cdff1c8d6614e755cbc2d8f19f0db0a1834f5012034f0583974aa881f7500d367fea7887ee5836a8a91ce013bf41bd560545d90d837f0e4922ac1b28486ea11221ad33c3812e9606027d5fbefeccf4dae9149ca36501418d3199d3f2be4a4c70469e96fc52b51c38f5a64d2c7a5d825f36b12b2ecbd4d6d6167362686dd29a6a26c303daebe87b8514f190c8f89b5b754d12997b5a46938df329f8116779cfd3ea670f8236742ca6a0d7ae71143dbee5b818a8fd22b816950944567a3ef3f4c5f70c473a7743b54ac7bf92f217dda03c96c226f0fc655091ab15ac5e05a699f91871891b3380f71b70c193bddd23af6bc08c302118f5f9fe026e380c4398b4e2d0331dcbe5991a79fdf70ff0a40171818c479116bf95b67add29bbfc3ee92693d3bd4b8b2a68301eacd4aa92ca530804187ba5e1043d1ece51983625cbe6f73cf8e928188f1806b66232fa0d74c331acd6bc7c945323aed5099c9d60b4356f054eaa3c0caca9960d773d26fb4c11a6aa5a857bc21c345262cb9870227af57d62db58e49da7fdbe1b69c3d095c069053aa7daa67226287127f851cbe34c7b0b218ef2a72ae15c037fae2e000d2048751fb0966a6f680ba88e210d917fafb4d40be6c9e1993caecb0131f6c0d7d85bfe2cee75aa5162a70d7ed927a4c4ef5a1dc0ad093df282c306b4836a09afd47528aaeac8406da4b0aa917fc8eeda001fdd89f514300afc21bd6a6a288818285f0da4a8b6339d805d65bb6db75354c2f2d9367f536447acac1113b2bb4245322c423fbace9e4d5a5648c1ef79b027a6c2feb0100427d6ef7547bdfe26ebc0664d9dc89fe681e70b435e9caa8d77832d7978ffacf34ae2a83a797997e28d3c6e65d7f2549ebc3f5bb22d2d581fbf1d4b59482595d20c691b52dcfc7facab2f64374c82a8b565671db547e1c785eb1804617c26e7da9e28a0bc2f74a5570fcaaf4055f5352a950c2c23e935198120be586db9bbbe4692bd2584439d346e3a0bdc31130abc12f8ac6d1284e174945e2eaa73c525f0f250953add2d227069ef9c5f4ad06ad3478597391550f9dd7c7b7029a4491311f94a76e2d0564a692d390317be0495a29d1252c212b7c7afc1a2c70c1c2404b1f0f0abe035a82c7affa96b31622e70f8a54461acfd3dbd285f1a47ebcb255bb143ead2cd5272b88383378e4a552dbf3c41263fcbe9744a2b37322e591a2f6dfbbcb1668126bc5c93b97d1c859efa05473e0909785eb556a353decb2694f9aab0a02ae6a78cd0da0202b18a70545e61a13ab411a639212e95b6d177155b74456cd0cdf580246ca913c29260dc360e53e3646ff14b4e91391042b8c4001f46a3a0713741b5c23060733f7d6dd0fe1713413909aff277e70f36a491b5015994ef63a1b09faa2c2eeda444291e98afad6d00966576beac0425743c4c3b186b6c5e5c7a7166f43d95fe27de899cb99ec3f9a97c69b2828a5f7858faade9b8eccaeb5e83374e008d14e9bd6f997b230b48137a5c425253eeb481531fc499c64e23dc793698c624b3b1c127320fefbc14750f23f1b18e8378e3f181715d37ad28df23d36d4b22618953de72b4505a8d66bfd8242f5a31c4e6e12913e70e400e5fd47958ac85b6b58a726712e59810f868d4b4794fee843def4ec053b32a574c6f056f66c810a386eef62055807737c5b324132bedb8d938dfc017368b45bfd95536bb472e46172cc4c8291b9e7f2629d7129a425cb193f3e2f08980325cc9c71924ace54ea32401cf7467bbe2d4f6ed4ddc3ca4c909cd55f10df672905d2d8015d694479ebf0632ee21aa7d8306fc7c6e61a289f1869e89dd72af80489ce109725a823f3c3a8e37c62894e69206891accf786fe562fa461846f887d1c9d43eee9313806caf27d30801125eb43bc23e396b8f623feced2dc74ac8f3da3a33993062886096e68935edac34c1ebb7575f6b2bd81c0e5bf0d35195002a0157b5c77b26b70c814da3b676c135c29bd523fa23dcfcd1f9d0d32b3f3479bc72d2d83dc1dc485f76322bcd7afa8d1438a4175ad7a2e41b08c08dc8cfa38215888aed052f4211fd0dc543900f53c53d1b4a7cb5dd35a7df95037bf76e11b6c7cf96aa5bb2281c33b6c43581fc4bcf28c31bccd1e257ac6e6995f495d23fd091e8d5aea516193480d72be89f1c19a21b805f039638f68baf8b6900a55c42732ed3548061cc2110114c1333c61ba3ee5eefdb56de021859cbb48eb2c061fd65e39784708e3aebb5a28aef6d9d18f7213cda63b36f29c5631cf6c41b12a35a68561387fd48f50f515719565c20f7273d46dc73f5cd857ffd2037221ea1ebe521b47cca42d61c19d1c04f834c09b49020e7239919e68c0c6e6cd0b672e291cee677ced56188dc6194803b86332e565b56eced61cea98512de877a9f1a534baa02943a1c2ef9d8c9d02aefcae6a65e0d9abd6a8e33c3712cd454f2b0e1820e21f4f3bdff4b62a324db32a7e07ed49e9492e51140a620e90d6fb1329f180476d8510a6b689093d2395e08ef73de6385344538995c51f9d7575be36c64cf769b1d8d1acfec4ca8e994aafe83fcebccf1eed43d06c5c72dd2f5d545ec554271f5243be184bc67d8604ce6bea5e6cedfb7a8692410d6e3456c0eb6024317b4bcbde85e5a42bd4bc4bc8319dcf8e72739f4bdf23096735fb42f1f27f07f733efa08221f31c0aa949ce33d93f0e3d0159b1465238ad4e55bef959489c73349c95450ad27f2a107c808799f9cdb0bf8897ae3a41d9aa38113aaf46bd3c47d18a40a791f5f2127110aff0c0d83656df3c507ff807bfe4b817b9a15b0d5ee86e0ae483b6e379c151055aefa383955a2a667585333e480d8e1f97f4f9ff6d5038b0bbe09085105b7e98e67fd316ce5e35e6c82fef3ec99ae72c36836c64466d97d3cae171759cdb38661813be95469b8b004ceca505aa8554c9229de91743001fff459dea8a6a3d3b1218945ff299c1a11d73ebdc45cff0d519e4a300cab4054aa8ca11f984a51f9bf8bf95e908f9d2e2ba6d0d65003dea9565374bb3822a545f99c738c77dcc59516e51be54f207403a3494a9de6810f0d278896a54cf9488fa69087887a58cb1f556396db4b3704a690e6e24b71e9f2566466f1cdecac939f170b2cd55c0a2112a0da18ba45c2ed2ad949ab31a6662ba51cde806ef92dca978ca5b0ed1144f8b88e5787a3f7812561c2ea52d86c456b352f06d1ab58950a1c1589091739aba3663a6ad5d0d410225b46a962096ff53e777693138acbb8d7850db1a83d019816a5dd6cac2206e13421b0238abba1d4b45bf749d2ae103e571a9a4212e0bf54189790af354eb9c42c2080c492fe718db7f479d21a86b5b05c2b32165e070eceb8679df560838e159ac4230e11d554c0d3ae5ba95350ba73fc01eda241fe637ac3baf5ff4d195636b69231c68e5260a4e39b5c34c801ca950cc946253e6ed9d805bb74ffe8e38bfb9f3f5e76483ff19e69a1f29adf95915d7a1c6b5d94da99dc2cbf92291374d7c9a58ab6510fdac78c90a472650927e246326059c341cd40d836d639b9c1be02ea019aad17ba1610ac29de147ded1c2dbeb47f3b173b0ff05ef662fd2780613823a0f295907cbd24c45f3489e55f31a4a89d4b0f41128158811c4f72759f111e3126db5a05a138b90fe3a81167825d07e56814d0086ef8f34de9d4a196441ad765d10d71f29546d5402cfa810feec5358ec7a73c3edd9b5f7745a182e1df4be3aba3ba87c51551f3987d2b2af62c26c7e4ef17f0d115293f22846a1fdce53cb5143cac06bc6c92590bc0004d1fddde8d8648a6969b9536f9047894ccd58ac73b56bf2ea074d2f2bbd8d56749cf3ff59edc4039cbff85e07a4398192debf960252e7ba5b33c23f4de7875830316d45ba77d0f9f1739ed77b79d21a7898e4a48485649e5a9a461384e5fe56e5ed06f0ea75b69b82b2490247edbbb7f41ab493853225555661d52ace9f2b55ad9eef56d0ddbb2b80db265c8b755e6f00e929fa50491c36684aa72b8e78436392df2e4983ed8c8b3710af2c27da1b871ffa90b79de3d473aff22d0cb3e5e8318eb83419cafd181f6868b19cef288b6676566e0c2e567da0e409e483d908deebc44967cab04cb30a17c300216ea1a4e4a97c72833180c06af3b7b9cc6fdf37e7bb3e28af57b0c3ec6ee19ad2bf661a360af725e8792b9a6c97b298a06c4b0f8f276e76c40779781e134fe8be1c16430635cba42be0b39907337ddd4eaa14df1e3c2714ca3e411206948053a876f92236b7240202a825e1f4155a58c4e2c9b287dec419004ed551f900ae8134b00540b5a6e47c3fafa468ac82e735491c2d87dae0a1140ea85dd3eb0a2fae7fc8916a25773ed63cd26a35679190d9d2d5547fa596507ba71eb46f22d39d677c3911e6a7ff2efb0e772406375cb2b21137e978fdcefecc5393892ac82423a32d11a34c170407be489c040d4178703383e9351bd304cc498856b82b2e95f631fa0ceacdd6131d3a78adc3b968ab72d78bb16ddb26fa21a2430288010e6a79a748014d7c82011f80d526b4c09b0b98360727c136c34609e4794065a50d2f848c4d98e0a627be446235ffc1b5219b65a407f8a3e9f6b6988e11a92ea4191445d07040d35b801c0a7adf1c810cd3725b4a783933fa2708b501ebdb0db04a5dcfadc8542a53ff5536718cb6b9c73b004edeacf13e5cb55299e3d62c73a7056b7b453ded55af19b9a037166190172f1fcd6ffb664fe99a56e58491b3a36426da2f68544ca76ff73e7af5002c8353cabc19b1ec613767cc95051fe5832ebf89eaa6b5f9fef3a16c1783915286b8de8129fa4e71cc3df8f9b6f35d8f2558308e1d9fccbef948a51cbc2dc69ad273ee94793c22bf734f4e60b54166be653a4ef1795a9efe65cdf4fa208bd94026d7fbb10197855a2de97f0b3a35384ad33ed32903bc34262fb228ac19b41513cfbe068a171408655677cc6a71250f1381b2cbcce59b8613a99c879373281bc0916a9898d0cd113f4f77bb16be44b9d290df6e7ab40c2d09df5369051f2d9d7a16757947fcf6701a1464ba7a6dccfa78062ed8db8be90cfac334449180f6c4c389c67adb8348caf052cc74eb41ce6a76577497acb07376e6f58986a1be59e72db794977a8033f44a1efe2f4dbc577b44d67e7c54793d4d61f1a2ed0db01144ce89ecda427120efd12786ce810e2b913aaf5aa4e9b0d87a1602366270388d2f30fa5abfc21ff672a11278ed3b6d38d5e54e4296c131e0b95bd159f74d8fb04fdee26c71aba42b6cd6e8decac2f8edde6cca519f20d4a4c497fe7a018412f97dd54fe07f4c9936401e5b4b852c78633d6ccbfaec9b80480e1450244ddf88ab9ebdd73b1a773ebc26388084c281b5156c1e48937802127816138dccfabc353e1ae086517b7912eb1355cb1516af0e03a7dee0bc83a9cc894309fbba8c78bfd001fa39bb4f734030f1049dad2afb290f086df22edf8f2153b80ac4ad4c90f6bcae87f763470907faebaf19f0b08e56bf45c23a67def54a2efb487572fd84832de431fd9dba7da257ea3fa04d573fa693e7714231f246beb65ddd27d7a088214642f2cac789c4b720d4e165ebd1b955bc1ee3d45f819af2874bbe4882702bb662380169a20d53dbe2cc1b9339268c52ae96d30da2f65b515a", 0x1000, 0xfffffffffffffffc) 14:59:03 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101400, 0x0) read$FUSE(r0, 0x0, 0x0) 14:59:03 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) read$FUSE(r2, 0x0, 0x0) 14:59:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:59:03 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x8981, &(0x7f0000002400)) 14:59:03 executing program 0: r0 = getpgrp(0xffffffffffffffff) migrate_pages(r0, 0x6, 0x0, 0x0) 14:59:03 executing program 5: syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x1, &(0x7f00000012c0)=[{0x0, 0x0, 0x1528}], 0x0, 0x0) 14:59:03 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x16, r1, r2) 14:59:03 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x8904, &(0x7f0000002400)) 14:59:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @dev}], 0x2c) 14:59:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x0, 0x0, 0x0, {0x7, 0x7, './file0', './file0'}}, 0x28}}, 0x0) 14:59:03 executing program 1: pipe2$9p(&(0x7f0000000640)={0xffffffffffffffff}, 0x0) fstatfs(r0, &(0x7f00000008c0)=""/4096) 14:59:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x805, 0xffffffffffffffff, 0xfff}, 0x40) 14:59:03 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, 0x0, 0x20b) 14:59:03 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vim2m\x00', 0x2, 0x0) fremovexattr(r0, 0x0) 14:59:03 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 14:59:03 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x1212c0, 0x0) 14:59:03 executing program 5: pipe2$9p(&(0x7f0000000e40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1) write$binfmt_elf32(r1, &(0x7f00000017c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 14:59:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x8, 0x1}, 0x40) [ 555.868747] print_req_error: I/O error, dev loop5, sector 0 14:59:03 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x9, r1, r2) 14:59:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 555.982035] print_req_error: I/O error, dev loop5, sector 0 14:59:04 executing program 3: syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x1, &(0x7f00000012c0)=[{&(0x7f00000001c0)="d4", 0x1}], 0x0, 0x0) 14:59:04 executing program 4: r0 = getpgid(0x0) r1 = getpgid(0x0) kcmp(r0, r1, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) 14:59:04 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x49101, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}}, 0xa0) 14:59:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000340)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}]}, 0x58}}, 0x0) 14:59:04 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000002400)={0x7d, 0x0, 0x8, 0x8, 0x3ddd5681}) 14:59:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x66}}}, [@NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}]}]}, 0x38}}, 0x0) 14:59:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="60000000310089"], 0x60}}, 0x0) 14:59:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000500)={'gre0\x00', &(0x7f0000000400)={'ip_vti0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @dev}}}}) 14:59:04 executing program 2: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private2}}) 14:59:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000003b00)={&(0x7f0000000240)=@proc={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000003a40)=[{&(0x7f0000000280)={0xec4, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@dev}, @nested={0xea9, 0x0, 0x0, 0x1, [@generic="0ec76e64e9264528e59be90a3c8e57d8d507ed8eda2c", @generic="6c97800796d56e38672723f4c0319ed0b9e3a434daa22e5d94f95124e4e4135fd86709cf7a0afe278d275c8569e075a5ffb70197b980bf9598eba723b4d4b7b2614382cb3e9a910dc625ededcccc0fed55aa561c06e3245c0c7041977ddecd905b299581ee8a16cddbd86651744be0a4a039fba5eba661966e765706dd746c54088be41e3488e815a7a1c6dff7a565883cb55e33c39745391aaf33d51a97efb5067026d24896012134c9c28506ed197f6fa72dd1ad28771988f3de6c3f4acdb42f71854b73a846a7ec7fdab69462dd9e4d94072334bc07b05eae5cef2ebebe17fe160e310cfcf34176230740a3f6ff84ff", @typed={0x12, 0x0, 0x0, 0x0, @str='}*}!:{]^%@.{(\x00'}, @generic="8ae0ce018665030426620a77ae9fdfdad32befb284674bbb5e9e45fed25632d8f4b1f51acaef669b6d3989fd849a28470015edad6579aef263673b6782d3432588b6a339eeca86c1a809db92b749f2d5ac75c5a9bf7c59a1b0860dbf2622800fcb4c8ea0021968d0393fe26e995973ef977b307b9502757c71461bb4ae9eb141ce4bb5b6423fc0d8cd0678495c863a93fcf48075d6a9ed3fb82d2b93efec3c3b50a4820ca314c1637c51db492b604d019c827cc820c465a5fc35bdca15234465b0746859921dd21a6b47561d7ff467ef6e14b67fcbadc9589d01433724a34abd20b0aa160d3b03fbabbe165a819e9325cce7cf9ee08b49", @generic="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"]}]}, 0xec4}], 0x1}, 0x0) [ 556.175643] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 14:59:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="6000000011008924f0a1abc56f1cdf250000", @ANYBLOB="004401"], 0x60}}, 0x0) 14:59:04 executing program 4: socketpair(0x23, 0x0, 0xe1010000, &(0x7f0000000740)) [ 556.237496] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 556.253005] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. [ 556.276390] tc_ctl_action: received NO action attribs 14:59:04 executing program 3: bpf$MAP_CREATE(0x13, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 14:59:04 executing program 1: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast}}}}) 14:59:04 executing program 0: r0 = getpgid(0x0) sched_getaffinity(r0, 0x8, &(0x7f00000002c0)) 14:59:04 executing program 2: syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x0, 0x0) 14:59:04 executing program 5: r0 = socket(0x23, 0x2, 0x0) getsockname$packet(r0, 0x0, 0x0) 14:59:04 executing program 4: r0 = socket(0x11, 0xa, 0x0) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 556.356869] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 14:59:04 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x5421, &(0x7f0000002400)) 14:59:04 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) pipe2$9p(&(0x7f0000000e40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$dupfd(r0, 0x0, r2) dup3(r1, r0, 0x0) 14:59:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:59:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpgid(0x0) sendmmsg$unix(r0, &(0x7f0000004380)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}], 0x20}], 0x1, 0x44081) 14:59:04 executing program 0: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/ocfs2_control\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, 0x0, 0x0) 14:59:04 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e1, &(0x7f0000002400)) 14:59:04 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x11) 14:59:04 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x8907, 0x0) 14:59:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000040)=@ipv4_newaddr={0x50, 0x14, 0x801, 0x70bd2a, 0x25dfdbfb, {0x2, 0x10, 0x20, 0xff}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x0, 0x6, 0x7}}, @IFA_LOCAL={0xfffffd2c, 0x2, @broadcast}, @IFA_ADDRESS={0x8, 0x1, @loopback}, @IFA_CACHEINFO={0x14}]}, 0x50}}, 0x0) 14:59:04 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vim2m\x00', 0x2, 0x0) fremovexattr(r0, &(0x7f0000001100)=@random={'security.', '@\\!/.[^\x00'}) 14:59:04 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 14:59:04 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0xb, r1, r2) 14:59:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x10, 0x4, 0x0, 0x1}, 0x40) 14:59:04 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='s', 0x1, r0) keyctl$link(0x2, r1, 0x0) 14:59:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000040)=@ipv4_newaddr={0x50, 0x14, 0x801, 0x70bd2a, 0x0, {}, [@IFA_CACHEINFO={0x14}, @IFA_LOCAL={0xfffffd2c, 0x2, @broadcast}, @IFA_ADDRESS={0x8, 0x1, @loopback}, @IFA_CACHEINFO={0x14}]}, 0x50}}, 0x0) 14:59:04 executing program 5: r0 = socket(0x23, 0x2, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 14:59:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x11, r1, r2) 14:59:04 executing program 1: keyctl$link(0x15, 0x0, 0x0) [ 556.754748] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 556.775667] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 556.865500] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. 14:59:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=@ipmr_newroute={0x10, 0x18, 0x1}, 0x1c}}, 0x0) 14:59:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$netlink(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000000)=[{0x0, 0x10d0}], 0x1}, 0x0) 14:59:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000b00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000b1"], 0x38}], 0x1, 0x0) 14:59:04 executing program 0: socketpair(0x2, 0x6, 0x0, &(0x7f0000000740)) 14:59:04 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x1d, r1, r2) 14:59:04 executing program 5: r0 = socket(0x23, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', r0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) 14:59:05 executing program 1: r0 = socket(0xa, 0x3, 0x3) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', r0) 14:59:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="d2", 0x1, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f00000013c0)='user\x00', 0x0, 0x0, 0x0, r3) 14:59:05 executing program 5: add_key(&(0x7f0000000040)='logon\x00', 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffb) 14:59:05 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2, 0x0) write$input_event(r0, &(0x7f0000000180)={{0x77359400}}, 0x18) 14:59:05 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0xc0045878, 0x0) 14:59:05 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10}, 0xfffffdef}}, 0x0) 14:59:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f2, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000400)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @dev}}}}) 14:59:05 executing program 1: perf_event_open(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20a20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x146c2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:59:05 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f0000005900)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000058c0)=[@rights={{0x10}}], 0x10}, 0x0) 14:59:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000038c0)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{0xffffffffffffffff}], 0x1}, 0x0) 14:59:05 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) readv(r0, &(0x7f0000002700)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1) 14:59:05 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x2280, 0x0) 14:59:05 executing program 5: syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000080)=']', 0x1}, {&(0x7f0000000140)="a6", 0x1}, {&(0x7f00000001c0)="d4", 0x1}], 0x0, 0x0) 14:59:05 executing program 1: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, 0x0, 0x0) 14:59:05 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000240)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6}, 0x10) 14:59:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) 14:59:05 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='big_key\x00', 0x0, 0x0, 0x0, r0) 14:59:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='gretap0\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00d']}) [ 557.385255] device batadv0 entered promiscuous mode [ 557.391871] device batadv0 left promiscuous mode [ 557.409991] device batadv0 entered promiscuous mode [ 557.419555] device batadv0 left promiscuous mode 14:59:05 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x60000004}) 14:59:05 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 14:59:05 executing program 1: add_key(&(0x7f0000000000)='keyring\x00', 0x0, &(0x7f0000000400)="bd", 0x1, 0xffffffffffffffff) 14:59:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=@ipmr_newroute={0x1c, 0x67, 0x1}, 0x1c}}, 0x0) 14:59:05 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) 14:59:05 executing program 5: socketpair(0x23, 0x0, 0xe9010000, &(0x7f0000000740)) 14:59:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x8, r1, r2) 14:59:05 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) 14:59:05 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000180)='A', 0x1, r0) 14:59:05 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_int(r0, 0x10d, 0x0, 0x0, 0x0) 14:59:05 executing program 4: r0 = socket(0x25, 0x1, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) 14:59:05 executing program 0: syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x80, 0x0) 14:59:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000180)=ANY=[]}) 14:59:05 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = getpid() r2 = getpid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)) 14:59:05 executing program 5: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 14:59:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000001c0)='big_key\x00', 0x0, &(0x7f0000000240)="7f", 0x1, r0) 14:59:05 executing program 0: syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000080)=']', 0x1}, {&(0x7f0000000140)="a6", 0x1, 0xfffffffffffffff7}, {&(0x7f00000001c0)="d4", 0x1, 0x1528}], 0x0, 0x0) 14:59:06 executing program 5: socket$unix(0x1, 0x3, 0x0) 14:59:06 executing program 4: bpf$MAP_CREATE(0x4, 0x0, 0x77) 14:59:06 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 14:59:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="c4", 0x1, r0) keyctl$link(0x3, r1, 0x0) 14:59:06 executing program 0: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='}', 0x1, 0xfffffffffffffffc) 14:59:06 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) accept$phonet_pipe(r2, 0x0, 0x0) 14:59:06 executing program 1: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) fsetxattr$security_capability(r0, 0x0, 0x0, 0x0, 0x0) 14:59:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x8, 0x4, 0x6, 0x10, 0x1}, 0x40) 14:59:06 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x89e1, 0x0) 14:59:06 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000740)) 14:59:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x0, 0x0, 0x80000001, 0x0, 0x1}, 0x32) 14:59:06 executing program 2: r0 = socket(0x11, 0xa, 0x0) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 14:59:06 executing program 5: r0 = socket(0x11, 0xa, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, 0x0, 0x0) 14:59:06 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x4, &(0x7f0000000000)=0x1ff, 0x4) 14:59:06 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x8901, 0x0) 14:59:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="74756e06000000b95a24a59e1d960059ac5bcec3ec"]}) 14:59:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="60000000170089"], 0x60}}, 0x0) 14:59:06 executing program 4: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'wg0\x00'}) 14:59:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) pipe2$9p(0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) getpgid(0xffffffffffffffff) getuid() socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 14:59:06 executing program 5: keyctl$link(0xa, 0x0, 0x0) 14:59:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x2a, 0x9, 0x2}, 0x40) 14:59:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:06 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x541b, 0x0) 14:59:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/179, &(0x7f00000000c0)=0xfffffffffffffcba) 14:59:06 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 14:59:06 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000080), 0xffffffffffffff91) 14:59:06 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = getpid() r2 = getpid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r0}) 14:59:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xfffffffffffffef2, &(0x7f0000000340)={&(0x7f0000000140)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:syslogd_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}]}, 0x64}}, 0x0) 14:59:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=@ipmr_newroute={0x1c}, 0x1c}, 0x8}, 0x0) 14:59:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="6000000011008924", @ANYRES32=0x0, @ANYBLOB="00440100c2"], 0x60}}, 0x0) 14:59:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000940)={0x5}, 0x40) 14:59:06 executing program 4: bpf$MAP_CREATE(0x4, 0x0, 0x10) 14:59:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002200)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000002480)={&(0x7f00000021c0), 0xc, &(0x7f0000002440)={&(0x7f0000000340)={0x230, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}}}, [@NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x58, 0x3, 0x0, 0x1, [{0x54, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x4e, 0x1, "c924edeab56c99a3e7e576dda9b23a7653af46338a5046e269498386759861bdb146861a77de30ee50523c4d66899c136f8e0bcfff2932c841eb35ef9c8cc58c57fd91974b9d981d8e89"}}]}, @NL80211_ATTR_COALESCE_RULE_CONDITION={0x8}, @NL80211_ATTR_COALESCE_RULE_DELAY={0xc}, @NL80211_ATTR_COALESCE_RULE_CONDITION={0x8}, @NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, @NL80211_PKTPAT_PATTERN={0x4}}]}, @NL80211_ATTR_COALESCE_RULE_DELAY={0x8}, @NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x180, 0x3, 0x0, 0x1, [{0x9c, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x97, 0x1, "c040644e9c8d5f61196fd151b75252eb63d9ac8e6a72190e0f07b76a7ae0c3ba9831d35996952cdd9d93c4757527e66d05a55d7acbdc92a6c6ac01e64200e6ee3bef08e1c448b571b954bfa380fb2f56cdf831cb0b54822403e81cef09b23add2ec74a051063b6f78689562f6aaeb284716b3c99a9888d9f57dca99ff15b232267e7aa82719849134ed29a2e8d443b48a8930b"}}, {0xe0, 0x0, 0x0, 0x1, @NL80211_PKTPAT_PATTERN={0xdb, 0x2, "869b1ad674eb3ec7c45beee26c40cf0331f0c1e3086ae43e1382844df204296d7ec9f496b987bede2b4ae51e263a04513dce81968817fb696267236d1d73c69a58dba33b8405c6e91fbf5b3ffd30639c93ff5882a9dbb2c32a1b49ee0fc864238489179a9c699f3799a44f11fff9de33a25eea66d8673439f5c8749fd62991e05fded3b990faee5b1049739b0ba0a13ef7bbe1623f9520b3fad3fc2c1c3fec6a9abccac978c9ba0bd81a87cd34192593c77bebb20858e50dfc23643776a163246fd821c2cfafbd02c4cc20dbf2a47407cd8eab86430ddc"}}]}, @NL80211_ATTR_COALESCE_RULE_CONDITION={0x8}, @NL80211_ATTR_COALESCE_RULE_DELAY]}, 0x230}, 0x1, 0x0, 0x0, 0x4004084}, 0x8) 14:59:06 executing program 5: bpf$MAP_CREATE(0xf, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 14:59:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000240)={'syztnl1\x00', 0x0}) 14:59:06 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x40049409, 0x0) 14:59:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f0000003b00)={0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f0000000280)={0xec4, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@dev}, @nested={0xea9, 0x0, 0x0, 0x1, [@generic="0ec76e64e9264528e59be90a3c8e57d8d507ed8eda2c", @generic="6c97800796d56e38672723f4c0319ed0b9e3a434daa22e5d94f95124e4e4135fd86709cf7a0afe278d275c8569e075a5ffb70197b980bf9598eba723b4d4b7b2614382cb3e9a910dc625ededcccc0fed55aa561c06e3245c0c7041977ddecd905b299581ee8a16cddbd86651744be0a4a039fba5eba661966e765706dd746c54088be41e3488e815a7a1c6dff7a565883cb55e33c39745391aaf33d51a97efb5067026d24896012134c9c28506ed197f6fa72dd1ad28771988f3de6c3f4acdb42f71854b73a846a7ec7fdab69462dd9e4d94072334bc07b05eae5cef2ebebe17fe160e310cfcf34176230740a3f6ff84ff", @typed={0x12, 0x0, 0x0, 0x0, @str='}*}!:{]^%@.{(\x00'}, @generic="8ae0ce018665030426620a77ae9fdfdad32befb284674bbb5e9e45fed25632d8f4b1f51acaef669b6d3989fd849a28470015edad6579aef263673b6782d3432588b6a339eeca86c1a809db92b749f2d5ac75c5a9bf7c59a1b0860dbf2622800fcb4c8ea0021968d0393fe26e995973ef977b307b9502757c71461bb4ae9eb141ce4bb5b6423fc0d8cd0678495c863a93fcf48075d6a9ed3fb82d2b93efec3c3b50a4820ca314c1637c51db492b604d019c827cc820c465a5fc35bdca15234465b0746859921dd21a6b47561d7ff467ef6e14b67fcbadc9589d01433724a34abd20b0aa160d3b03fbabbe165a819e9325cce7cf9ee08b49", @generic="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"]}]}, 0xec4}], 0x1, &(0x7f0000003ac0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}], 0x20}, 0x0) 14:59:06 executing program 5: syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x1, &(0x7f00000012c0)=[{&(0x7f00000001c0)="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", 0xe41}], 0x0, 0x0) 14:59:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0xb, r1, 0x0) [ 558.797179] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 558.810291] netlink: 532 bytes leftover after parsing attributes in process `syz-executor.0'. 14:59:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @private, @loopback}}}}) 14:59:06 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89ea, &(0x7f0000002400)) 14:59:06 executing program 2: add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 14:59:06 executing program 4: r0 = getpgrp(0x0) migrate_pages(r0, 0x5, 0x0, &(0x7f0000000200)=0x1) 14:59:06 executing program 0: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) 14:59:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000400)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @dev}}}}) 14:59:06 executing program 5: socket(0x1d, 0x0, 0xffff8001) 14:59:07 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$link(0x3, r1, 0x0) keyctl$clear(0x7, r1) 14:59:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={&(0x7f0000000000), 0xc, &(0x7f0000000700)={&(0x7f0000000680)=@ipmr_newroute={0x3c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_LOCAL_NH6={0x14, 0x5, @empty}}, @RTA_OIF={0x8}]}, 0x3c}}, 0x0) 14:59:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x60}, 0x300}, 0x0) 14:59:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x8, 0x4, 0x6, 0x10, 0x1, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 14:59:07 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x2, 0x0) 14:59:07 executing program 5: r0 = socket(0xa, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00', r0) 14:59:07 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x8940, 0x0) 14:59:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$clear(0x7, r2) 14:59:07 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) pipe2$9p(&(0x7f0000000e40)={0xffffffffffffffff}, 0x0) dup3(r1, r0, 0x0) 14:59:07 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89eb, &(0x7f0000002400)) 14:59:07 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002480)='./cgroup/syz1\x00', 0x200002, 0x0) 14:59:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0xabaa1104ab47b37b, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 14:59:07 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r1) 14:59:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, 0x0, 0xa02}, 0x40) 14:59:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8947, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) 14:59:07 executing program 0: add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="c8", 0x1, 0xffffffffffffffff) 14:59:07 executing program 4: pipe2$9p(&(0x7f0000000640), 0x0) 14:59:07 executing program 1: socketpair(0x10, 0x2, 0x0, &(0x7f0000000740)) 14:59:07 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)) 14:59:07 executing program 5: r0 = socket(0x23, 0x2, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 14:59:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0xc0}, 0x10}}, 0x0) 14:59:07 executing program 0: socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 14:59:07 executing program 2: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x2, &(0x7f0000000080), 0x8) 14:59:07 executing program 4: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) 14:59:07 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000002, 0x12, r0, 0x0) 14:59:07 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, 0x0) 14:59:07 executing program 2: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000000c0)={'sit0\x00', 0x0}) 14:59:07 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x34}}, 0x0) 14:59:07 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 14:59:07 executing program 1: r0 = socket(0x2, 0xa, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x28}}, 0x0) 14:59:07 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r2, r3) 14:59:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="6000000011008924", @ANYRES32=0x0, @ANYBLOB="00440100c208000040"], 0x60}}, 0x0) 14:59:07 executing program 5: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000740)) 14:59:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000640)='NLBL_UNLBL\x00', r0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x44, r1, 0x11, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @private}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:apt_var_lib_t:s0\x00'}]}, 0x44}}, 0x0) 14:59:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x5, 0x0, r2) 14:59:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x81000000}, 0x0) 14:59:07 executing program 2: bind$phonet(0xffffffffffffffff, 0x0, 0x0) 14:59:07 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x80, 0x40000012, 0xffffffffffffffff, 0x0) 14:59:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x890d, 0x0) 14:59:07 executing program 2: recvfrom$phonet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:07 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 14:59:07 executing program 0: r0 = socket(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 14:59:08 executing program 3: syz_mount_image$gfs2meta(&(0x7f0000000740)='gfs2meta\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, &(0x7f0000001a00), 0x1027c80, &(0x7f0000001ac0)) 14:59:08 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x80, 0x40000012, 0xffffffffffffffff, 0x0) 14:59:08 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5452, &(0x7f0000000000)={'erspan0\x00', 0x0}) 14:59:08 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0xf, r1, 0x0) 14:59:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000780)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000001240)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"473707e986b5fdcab78b1d411f94000e"}}}}, 0xa0) 14:59:08 executing program 0: add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$unlink(0x9, r1, r2) 14:59:08 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x80, 0x40000012, 0xffffffffffffffff, 0x0) 14:59:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x33fe0}}, 0x0) 14:59:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0xec1) 14:59:08 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x80, 0x40000012, 0xffffffffffffffff, 0x0) 14:59:08 executing program 2: socketpair(0x15, 0x5, 0x0, &(0x7f0000000740)) 14:59:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000800)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @dev}}}}) 14:59:08 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x4000) 14:59:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}) 14:59:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=@ipmr_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x80, 0x20}}, 0x1c}}, 0x0) 14:59:08 executing program 1: syz_mount_image$jffs2(&(0x7f0000000000)='jffs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f00000012c0)=[{0x0}, {&(0x7f00000001c0), 0x0, 0x1528}, {0x0}], 0x804, &(0x7f0000001340)={[{@compr_lzo='compr=lzo'}, {@compr_none='compr=none'}, {@compr_zlib='compr=zlib'}, {@rp_size={'rp_size'}}, {@compr_zlib='compr=zlib'}], [{@pcr={'pcr', 0x3d, 0x1c}}, {@euid_gt={'euid>'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@appraise_type='appraise_type=imasig'}, {@permit_directio='permit_directio'}, {@appraise='appraise'}, {@smackfstransmute={'smackfstransmute', 0x3d, '!h,'}}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@pcr={'pcr', 0x3d, 0x37}}]}) 14:59:08 executing program 0: syz_mount_image$gfs2meta(&(0x7f0000000000)='gfs2meta\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28001, &(0x7f0000000200)) 14:59:08 executing program 2: add_key$user(0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0) 14:59:08 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e8, 0x0) 14:59:08 executing program 2: syz_mount_image$ubifs(&(0x7f0000000000)='ubifs\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)) 14:59:08 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080)={[0x370]}, 0x8) 14:59:08 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) 14:59:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891b, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) 14:59:08 executing program 5: socketpair(0xa, 0x3, 0x9a, &(0x7f0000000740)) 14:59:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0xc, 0x0, r2) 14:59:08 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5450, 0x0) 14:59:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000940)={0xf, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 14:59:08 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x10}, 0x33fe0}}, 0x0) 14:59:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x10e, 0x0, 0x0, 0x0) 14:59:08 executing program 2: socketpair(0xa, 0x2, 0x73, &(0x7f0000000740)) [ 560.483449] UBIFS error (pid: 1695): cannot open "(null)", error -22 14:59:08 executing program 0: socket(0x11, 0x3, 0x7) 14:59:08 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x34}}, 0x40e4) 14:59:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x40) 14:59:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000040)={'gretap0\x00', 0x0}) 14:59:08 executing program 4: add_key(&(0x7f0000001200)='big_key\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="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", 0xfff, 0xfffffffffffffffc) 14:59:08 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendto$x25(r0, 0x0, 0x0, 0x80, 0x0, 0x0) 14:59:08 executing program 3: syz_mount_image$jffs2(&(0x7f0000000000)='jffs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)) 14:59:08 executing program 4: accept4$packet(0xffffffffffffffff, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001ac0)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000300)}], 0x4924924924927d9, 0x0) 14:59:08 executing program 2: socket(0x2b, 0x1, 0x7ff) 14:59:08 executing program 0: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x66}}}, [@NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}]}]}, 0x38}}, 0x0) 14:59:08 executing program 1: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffe000/0x2000)=nil], 0x0, 0x0, 0x0) 14:59:08 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000300)) 14:59:08 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x5042, 0x0) 14:59:08 executing program 5: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xa4080, 0x0) 14:59:08 executing program 1: r0 = epoll_create1(0x0) fstat(r0, &(0x7f0000005000)) [ 560.483992] UBIFS error (pid: 1695): cannot open "(null)", error -22 [ 560.796707] nla_parse: 2 callbacks suppressed [ 560.796714] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 14:59:08 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x16, r1, 0x0) 14:59:08 executing program 2: sendto$x25(0xffffffffffffffff, &(0x7f00000000c0)="a2419fec36b9140485fab189e41968ffc95a", 0x12, 0x8000, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="65727388c66e300000000000653b5897", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000450400140000000000049078640101017f000001"]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4c0602, 0x0) 14:59:08 executing program 1: pipe2$9p(&(0x7f0000000640)={0xffffffffffffffff}, 0x0) fremovexattr(r0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00') 14:59:08 executing program 5: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f0000000180)={'tunl0\x00', 0x0}) 14:59:08 executing program 3: socketpair(0xa, 0x2, 0x88, &(0x7f0000000740)) 14:59:09 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/ocfs2_control\x00', 0x8480, 0x0) 14:59:09 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000180)="fb7a", 0x2, r3) 14:59:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:59:09 executing program 2: syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0), 0x0, 0x0) 14:59:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 14:59:09 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@link_local, @random="2c2e091eafc9", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @multicast1}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 14:59:09 executing program 5: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffe000/0x2000)=nil], &(0x7f0000000040)=[0x80], 0x0, 0x0) 14:59:09 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') pipe2$9p(&(0x7f0000000640)={0xffffffffffffffff}, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={{r1}}) 14:59:09 executing program 0: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffe000/0x2000)=nil], &(0x7f0000000040), &(0x7f0000000080), 0x0) 14:59:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000780)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000001240)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"473707e986b5fdcab78b1d411f94000e"}}}}, 0xa0) 14:59:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001ac0)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0}], 0x1, 0x0) 14:59:09 executing program 5: pkey_mprotect(&(0x7f00007fd000/0x800000)=nil, 0x800000, 0x4, 0xffffffffffffffff) 14:59:09 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x894c, 0x0) 14:59:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x14, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 14:59:09 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/dlm_plock\x00', 0x0, 0x0) mmap$dsp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 14:59:09 executing program 4: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000025c0)='ns/user\x00') 14:59:09 executing program 2: sendto$phonet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:59:10 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) 14:59:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$link(0x8, r1, r2) 14:59:10 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x149753180b1c6631) 14:59:10 executing program 5: remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000008, 0x0, 0x0) 14:59:10 executing program 4: syz_mount_image$jffs2(0x0, 0x0, 0x0, 0x4, &(0x7f00000012c0)=[{&(0x7f0000000080)=']', 0x1}, {&(0x7f0000000140)="a6751712ce28640e34a7", 0xa, 0xfffffffffffffff7}, {&(0x7f00000001c0)="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", 0x16f, 0x1528}, {&(0x7f00000011c0)="e9", 0x1}], 0x0, 0x0) 14:59:10 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 14:59:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000040)=@ipv4_newaddr={0x50, 0x14, 0x801, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14}, @IFA_LOCAL={0xfffffd2c, 0x2, @broadcast}, @IFA_ADDRESS={0x8, 0x1, @loopback}, @IFA_CACHEINFO={0x14}]}, 0x50}}, 0x0) 14:59:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$link(0x8, r1, r2) 14:59:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000940), 0x74) 14:59:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=@ipmr_newroute={0xf, 0x18, 0x0, 0x0, 0x0, {}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_LOCAL_NH6={0x14, 0x5, @empty}}, @RTA_OIF={0x8}]}, 0x3c}}, 0x0) 14:59:10 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) [ 562.152929] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 14:59:10 executing program 3: r0 = epoll_create1(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xc}) 14:59:10 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$rose(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$link(0x8, r1, r2) 14:59:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) 14:59:10 executing program 2: bpf$MAP_CREATE(0x10, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 14:59:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8910, &(0x7f0000000240)={'ip_vti0\x00', 0x0}) 14:59:10 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x2}, 0x0) 14:59:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) 14:59:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$link(0x8, r1, r2) 14:59:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}}}) 14:59:10 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0xc0}, 0x0) 14:59:11 executing program 1: syz_mount_image$jffs2(&(0x7f0000000000)='jffs2\x00', 0x0, 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001340)) 14:59:11 executing program 2: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="85", 0x1, 0xfffffffffffffffd) 14:59:11 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 14:59:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f00000078c0)={0x0, 0x0, &(0x7f0000007880)={&(0x7f0000000140)=ANY=[@ANYBLOB="c41e000002c903"], 0x1ec4}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000020c0)='nl80211\x00', r0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000010c0)={0x1c, r1, 0x87368c1dad5bf3c3, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x1c}}, 0x0) 14:59:11 executing program 0: r0 = socket(0x23, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000001ac0)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0x0, r2, 0xee00}}}], 0x20}], 0x1, 0x0) 14:59:11 executing program 3: r0 = socket(0x23, 0x5, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 14:59:11 executing program 2: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x2, &(0x7f0000000080)={[0x370]}, 0x8) 14:59:11 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 14:59:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000001f00)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 14:59:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xa0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000004ac0)="a3bf53b7ec9f527785931230dae8a1a21b3e61df98ed21334719e2b8ca1a064ede05530fcf2057731acfc56772e4e89da354f24e8f7a54a773c691fe54d2d09d5aec87d69ce5f5a1e8bb38dd2c0a8f2bdd481e4b430a068eea1c985e14ce48f62671f158596eeb25a3d96a15fd20ce95071e819146b29be73c6e8d9fdbfa19b9fe5356498aa38488cf0e8e8040ef36967d1b491cdb20d25184", 0x99}], 0x1}, 0x0) 14:59:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000000140), 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30343636343439353900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c8b70d3c99374a58baa2fffdfaacb391010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011000)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x3000}, {0x0, 0x0, 0x6000}], 0x0, &(0x7f0000013c00)) [ 563.251565] EXT4-fs warning (device loop5): read_mmp_block:110: Error -117 while reading MMP block 0 14:59:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000, &(0x7f0000000180)="b7b80e2cde3457f8f5b3431c79df4af1a71dc055b4c5f0dfbe0f7edca3e5bb40dacaff1fab7c4ca439aad6df07256092ce3b92856cf6197d0e3fa6ce09495e60670d4a5034048cfc0095ba12a70b4e91b499663bd19bdfaa31f43ae238cb1faf0eec587c9fefedb3dae76dcef48c9612792c4b250b6f9ebad9601c46309c1e9ee57f6b39e620df5d76af17175d74cb89c4147e5d299fddda4c4089bec01d5c5d198106388b06e08faf817280298801fcf4e80a0e5ca1cd056ec410cca9fe5250a99de17021a8b7aa", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000280)="34b7fdadcf0ef35d6b81f36d4d9d09ef9d2ea37342a9fa064c3dcb1b5862056241f9c2e8b9fa74d86140d50757ea90cc164be9202291f06c0f3fcd320710aab76466910394aa3f2c5bb2107277740f40b9905ddc92e38f77896ababb042d0a2ba15da32099d536456a7ae7882b9ec8990274be670ebad2b8761469fa30bd338e14f078edc89325c1a70e6df803801b0bff98bee00078f7834fabb80392c3d74593b91562a756b6e083") exit_group(0x0) clone(0x4000, &(0x7f0000001340)="97f5afd6e4bb0830b6292cfb53079eeac6b39fbf9beace59a398a6f894cc8e565097d0a27c78613b0fd7a815f41390957ac2f219ceecc0abe48a2af6325feddda98a7f82e0de166e672656", &(0x7f00000023c0), &(0x7f0000002400), &(0x7f0000002440)="e280a9258d80c290157a132e224663654b79fe927d3f779446de18f050239409356ecad0649bc4e9bc0866") preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 14:59:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r1 = accept4$ax25(r0, &(0x7f0000000180)={{0x3, @default}, [@bcast, @rose, @bcast, @netrom, @rose, @null, @bcast, @netrom]}, &(0x7f0000000200)=0x48, 0x80800) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)=@getrule={0x14, 0x22, 0x200, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x810) sendmsg$nl_route(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x20000}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r5}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @rand_addr=0x64010102}]}}}]}, 0x44}}, 0x4000800) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)=@ipv6_newroute={0x28, 0x18, 0x300, 0x70bd2d, 0x25dfdbfb, {0xa, 0x80, 0x10, 0x52, 0xfc, 0x3, 0xc8, 0xa, 0x1400}, [@RTA_MULTIPATH={0xc, 0x9, {0x7fff, 0x28, 0x80, r5}}]}, 0x28}, 0x1, 0x0, 0x0, 0xc000000}, 0x44080) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000240)=""/14, 0xe}, {&(0x7f0000000280)=""/39, 0x27}, {&(0x7f00000002c0)=""/51, 0x33}, {&(0x7f00000003c0)=""/146, 0x92}, {&(0x7f0000000300)=""/73, 0x49}, {&(0x7f0000002680)=""/4096, 0x1000}, {&(0x7f0000000480)=""/74, 0x4a}, {&(0x7f0000003680)=""/4096, 0x1000}, {&(0x7f0000000500)=""/123, 0x7b}, {&(0x7f0000000580)=""/110, 0x6e}], 0xa, 0x100, 0x10001) preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x1, 0x4, 0x6, 0x4, 0x0, 0x0, 0x10b0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x32b, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x2000, 0x3, 0xffff, 0x3, 0x9, 0x1, 0x8}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 14:59:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/230, 0xe6}, {&(0x7f0000000280)=""/187, 0xbb}, {&(0x7f0000000340)=""/140, 0x8c}, {&(0x7f0000000400)=""/196, 0xc4}, {&(0x7f0000000000)=""/30, 0x1e}], 0x5) 14:59:11 executing program 5: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}) clone(0x288800, &(0x7f0000000180)="05afdd75e149b9424c2fefb2e74c21769afd244b26742007ff618524eb39edcc29bf20859176a7f5461e57aeda949cf704a0fc4aa06305ec16bbd4f5373fb821864e5c5f422657a4172f7d568e4cc2f904323d1136e10a28b2fd17a79b33eee5ff4bff32b6c817dcd8dd0464cca277ee8345e12cc2816888e7491e229d33f824924e697d80939d76a979c0dde66c29e729f78b219d1e9707", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000240)="ad01884ba20351deddd17fd0c5be519f407fe1790b8507295d203e94d4358bce37aec096c40677a9dc210ec60611bb6615e64526b5cfe12af49d00f08385c606373da56ac77277e7d8ac883cc15edcd9313f399ef6db10479864ddb16a1541d830b08f17633720c0d8eb04fc3c21e32d5f8e9c83905c8d6ad033907c2e07463ff98a601208182a478bc1ee253a18ebc40a302ed003b414c91796509e441b4ef3bf858908e0eab97ccd88ac91c24a7e") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r1, &(0x7f00000017c0), 0x16b, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 14:59:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x2710}}) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000011c0)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="6831f623ec0733210000128008000100736974001400028008081400ebffffff08000301ac1e2201"], 0x40}}, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000480)) write(r0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x7b, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xfedf) [ 563.354207] EXT4-fs warning (device loop4): read_mmp_block:110: Error -117 while reading MMP block 12 14:59:11 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/188, 0xbc}], 0x2, 0x0, 0x7) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r1 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x7fff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x380000, @mcast1}, 0xffffffffffffff47) sendmmsg$alg(r1, &(0x7f00000000c0)=[{0x20000000, 0xff00, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x29}], 0x18}], 0x1, 0x0) preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x111000, 0x12d) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x9, 0x20, 0x20, 0x1, 0x0, 0x0, 0xc0680, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_config_ext={0x6, 0xab5}, 0x800, 0x100000000, 0x0, 0x1, 0x73, 0x7f, 0x91c0}, r3, 0xc, r4, 0xa) [ 563.431222] print_req_error: I/O error, dev loop4, sector 24 14:59:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') timer_create(0x7, &(0x7f0000000000)={0x0, 0x41, 0x4, @thr={&(0x7f0000000080)="488a32e1856d89fee7cd0dd7c1c0385ba87e7c9c1a2758850d43d077818c1c7ddc98e6ee49938627087aa22bf24c1fc4d417c2e3980bfca33707557378ba3279a6b9f36339e23048eff3d0", &(0x7f0000000180)="6d16f0c02b1e30c1bd78728843bdd6a529062644f779a602baee393614b6f0b81e6eb78764491e3cd36d5de23c850d491a79d99a9a2a74f1bb3a22f77973af3af801360d713ec81f5dc288340f24e415ce875462707ce750ad10a92bd4a852c2b8073bccfb"}}, &(0x7f0000000200)=0x0) preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) timer_settime(r1, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000280)) [ 563.546211] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:11 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/163, 0xa3}, {&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000000080)=""/55, 0x37}], 0x3, 0x8000, 0x401) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, &(0x7f0000000340)=0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r1, &(0x7f00000017c0), 0x16b, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) syz_open_procfs(r3, &(0x7f0000000700)='net/udplite\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c0000000070301012bbd7000fbdbdf25070000043a008f8008007700", @ANYRES32, @ANYBLOB="0c00760002000000000000002caba6336d7f2d62857e7e2ba53c14c967c01464bc3a28e63252512d92cbd84ccabca63c03c0e83ea69b00000e47ca8e666cc385997de422d9dee77e87b189dd898050c458387f3b9bccac1a8618c2ae5cc1bf774770c6570dea58c7b6f2a9205e7a3fa18daf01d4723ecdfdab3b5b1866c9ab5f8a8714002980100090006e65742f72745f6163637400e5c285dcfa", @ANYRES32=0x0, @ANYBLOB='\x00'], 0xc0}, 0x1, 0x0, 0x0, 0x4004001}, 0x20040800) r4 = signalfd4(r1, &(0x7f0000000000)={[0xffffffff]}, 0x8, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000280)={0x9, 0x6, 0x0, 'queue1\x00', 0x3}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/123, 0x7b}, {&(0x7f0000000580)=""/48, 0x30}, {&(0x7f00000005c0)=""/194, 0xc2}], 0x3, 0xfffffff9, 0x8) 14:59:11 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x80, &(0x7f0000000180)="2a374cc83b4f78f2af12163a3204caab11c4b469920b9684754f3d317fa780e1a4f70285569b42383124e20d1fadbe3c30c4d28f61a19ae3878399a7afeaa45428becf43484ce4a3ae862f5a033603e09d405f2ece382abde0aafaf0236e808f00110f834c4f6803d29c373f06f68b7c02df923c536fd7c0ff1c53840ea90f8e30281a06348f859833776c98fd01052c7148fb3cd832222742ec0b1cb3aa4a9634f0348b94", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000240)="ddd53aef73b14ce252d2b2dabc8e9b5d2e9f542f04294f3b001ab2b78a88453d2b519ca338acb7bc858e2741108eb4effc7c99dc05e535bba4b5cfe02480292d1ef01d07e79e852803c24f4e7f0508950b9a98d14794af6c38b3692684481dc9cefe172bc9d45e1c5e1ce091f7f9d8cd640ae3595d") preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r1 = syz_mount_image$ocfs2(&(0x7f00000000c0)='ocfs2\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000300)="ec9390bb581b61349d6339883cf177065a4171990063f4d6167b0ff7cc928c8c50f3f39a455d380e2fd3c2559129b0318bebe9e064bfc43e851f007958854673cedb4e459aabbf04a0319d2c203ed2485723ff6945c1c29a8787a9e698e6e6854b2720591a35047c0dbc4c2e560f0f9ba41ffdfc3729d7f63a01598661af85a02f246734afd44ceffa521ae462576485607ab598c86c2286eb053528e7873b62fe7f0e140f2b5cca639424e8a9381ac97b33ff8f", 0xb4, 0x3}, {&(0x7f00000003c0)="41458b145a29228c98967113764eb569ace606bd907725d26a9f874dd2684925cdd47be98b930f8515ee4b27d102fa1645f42792e7669941d99dfbaf722c7d4876d4499afaa9adf2ef1377c25a4b81ecc2f742bbaa1914423be1ffebd4d47fdad1df14ab89e77fd533bfa58d2b23dfb65e6fbf429fa28a25f764f06efdc39866ceec159eff6fbd6a91614664bb410a769cbb91b66b56dcfafc04d7dc84d73093", 0xa0, 0x6}, {&(0x7f0000000480)="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", 0xff, 0x69}, {&(0x7f0000000580)="b9d0303e0a20975499d24c027000fb79", 0x10, 0x40}], 0xa0b80a, &(0x7f0000000640)={[{'net/rt_acct\x00'}, {'net/rt_acct\x00'}], [{@hash='hash'}, {@context={'context', 0x3d, 'staff_u'}}]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000680)={0x1, 0x1, 0xffffffffffffff5b}) preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) 14:59:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x4, 0x9, 0x8, 0x5, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x5}, 0x4010, 0xfffffffffffffffd, 0x9, 0x9, 0x7fff, 0x0, 0xb256}, r1, 0x10, r2, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@gettclass={0x24, 0x2a, 0x4, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xd, 0x7}, {0x3, 0x10}, {0xc, 0xfff1}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x1) 14:59:11 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000180)=0x200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000440)={0x16, 0x0, [], [@enc_lim={0x4, 0x1, 0x3}]}, 0x10) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast1}]}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x7281380}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=@getchain={0x5c, 0x66, 0x221, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r6, {0xa, 0xfff3}, {0x6, 0x1}, {0xe, 0x6}}, [{0x8, 0xb, 0x1ff}, {0x8, 0xb, 0x7f}, {0x8, 0xb, 0x501}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0xca9}, {0x8, 0xb, 0x7ff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_newroute={0x44, 0x18, 0x2, 0x70bd26, 0x25dfdbff, {0xa, 0x10, 0x90, 0x3f, 0xfd, 0x2, 0xfe, 0x7}, [@RTA_PREF={0x5, 0x14, 0x7}, @RTA_OIF={0x8, 0x4, r6}, @RTA_EXPIRES={0x8, 0x17, 0x2}, @RTA_ENCAP_TYPE={0x6}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4005}, 0x4001) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r7, &(0x7f00000017c0), 0x16b, 0x0, 0x0) 14:59:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x200000, &(0x7f0000001240)="58c8775f18aa0e8b8ff4263d37325f18081100360ccd4042d45dacbb8dc039b7d17f5b6be285006d72393c5fb0ea70f389a928e1ed092bee3dc0911520804dfa69047f8e69ac925d6c454e3c69c93dbad343f89a006680f9bba35fd7d2da5e8c3ed5b458f410de278082c369242f3af6036f89ff2c76014de8e63b479129719b91642f0acf50109c205e9d133d9b7748d3bcdd623d91751630b6", &(0x7f00000000c0), &(0x7f0000001300), &(0x7f0000001340)="85e16ac6d496171b3b859b7eba5490f5d3dff1f1c85a5ebf00") r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') clone(0x80040000, &(0x7f0000000180)="3ccb443d6b4067ad09d1fbc92d53ac5b924e107347a01a4fe1885de314b55371eec84fb1bfa61cdaa1fd3300d6ca8668ca2842e42f892fe204739a9ee4a32ed742033fe0bbad8a287ddd399db9ed4dfa6561794bb25af9f0cd9d1a075f404ee81fb49a81dafce7abc5e4deee86ee732b5cab2f3c43aaf40a2fd435b79cb9ca2038fec63e99545fb656be16838b2b691f2fcd1c059d722b45cf6d3ea0753f494d8b", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000240)="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") preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) 14:59:13 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') clone(0x10200000, &(0x7f0000000180)="ed861197e5a40afebc3f470b79968ff8813f81a04764a4fcb48168f54d07d793b785c518669df03b53ae3be7ca899525134cf9b816a2efd2253f16e06856b4eb045b2ad0077d757e2643cec08304ca6e229a5607e26ef5c2caf1812e8478c7435fcc5cf1189e93437734967c5f1ce08a5fe6a518ce5d19c9b862698ee3f9dfe122d0aa9590ca0e0fd4cf773368c35509778f3831d259dfba4d163f2b4c20fc204301273d5eabfa72eb4cc8932e1f8cc3d91cf47dfd1dc038eea14e3082176f61970025d90ba6004e01480000000000000000", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000280)="ea1881bb874849f62f0bb550dea6fe2968d95b84486b44ddce879f38aa32e13aa2a6765e58a0218e54f138821101393f76307b0d4be3578fd29f44908941088e9a7e38f092cf3436ceb517316ea553eb004d4475f3e93d9fe3e2c6ad461b1dbe3c109bc79d83757507e11cd56336a916d4cb0db0d57b51379190cbdf2a") preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) 14:59:13 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') timer_create(0x7, &(0x7f0000000000)={0x0, 0x41, 0x4, @thr={&(0x7f0000000080)="488a32e1856d89fee7cd0dd7c1c0385ba87e7c9c1a2758850d43d077818c1c7ddc98e6ee49938627087aa22bf24c1fc4d417c2e3980bfca33707557378ba3279a6b9f36339e23048eff3d0", &(0x7f0000000180)="6d16f0c02b1e30c1bd78728843bdd6a529062644f779a602baee393614b6f0b81e6eb78764491e3cd36d5de23c850d491a79d99a9a2a74f1bb3a22f77973af3af801360d713ec81f5dc288340f24e415ce875462707ce750ad10a92bd4a852c2b8073bccfb"}}, &(0x7f0000000200)=0x0) preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) timer_settime(r1, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000280)) 14:59:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x8402, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/164, 0xa4}], 0x1, 0x1f, 0x0) preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00', r0) sendmsg$NL80211_CMD_JOIN_OCB(r3, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r4, 0x2, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7fffffff}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x30}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2c}]}, 0x44}, 0x1, 0x0, 0x0, 0x8004}, 0x20000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={0x0, 0x9}, 0x8) 14:59:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/4096}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') exit_group(0x0) preadv(r1, &(0x7f00000017c0), 0x16b, 0x0, 0x0) 14:59:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x8402, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/164, 0xa4}], 0x1, 0x1f, 0x0) preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00', r0) sendmsg$NL80211_CMD_JOIN_OCB(r3, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r4, 0x2, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7fffffff}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x30}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2c}]}, 0x44}, 0x1, 0x0, 0x0, 0x8004}, 0x20000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={0x0, 0x9}, 0x8) 14:59:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001d00)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x721, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xcc, r1, 0x400, 0x70bd29, 0x25dfdbfc, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x7}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x7}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20048041}, 0x40000) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x42}, @loopback}, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x5, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x16b, 0x0, 0x0) 14:59:13 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0xf502, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 14:59:13 executing program 2: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x401}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000024c0)="b9800000c03500400000665c0f5d0202f5fbfb20e035c5e17de74b064000c4635765f766400fc774a600f30fbcf726660f38807769653626400fc7bb00000000360f7955f49af342d8868680000049b8206bc3c3220d2d4f5d2e66420fc73366bab6200000", 0x65}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000000280)={{0x0, 0x0, 0xffffffffffffff99, {0x100000}}, "be77f645fa0faab4173328e03e0e9f020bbc798c84be65bf762199e269b6d15af3d542e5a531a895866fbf13910d95e922d6aa84d68924efe5e444b34d9df08a868ae23c677546798d6ec2c17d6e3f87f0d757c2078c9325c641fea9938ba4f20ebb2577f51ba467d973398c7fa94be4e2abd427b7ad4385c63e630090759c2a6c768a973d0b1e7244e494d5925d9d9f40afd544b84d1fdb8de7af279d8700739c11327a76f8bc32743c959d8858b276c211222f40206257be84ddd07b20d8b1de9b5390ba5eaa289c0bfdf6b5636b7acfac5159e2e7759338e06ae00e4b7cf162e45442e3c8395858847e3e28da4ed237027cd849991ab91e6e5dc61b9936de574c3b26a2b0e303386c02ed1bb6a5acaf8a9271e196bc59fb3d7d6a88383d53302680fd8ebd0e75fa67333a6fb9da0333d6f87b3f628136a4b9ec1c2f4cf3d5ec900ec17d48e3f741860d963ec6e629243d06b547374ec3f5a0a8e71cdd67e8f591d68711ba4df1f2fc62d9f54c6f7b8844c8ce569fb7f983a631250e77374780413ab37235afdefb70572e79f35d36406aded61bcf76711aacf325b2ac1f78b4ede1239e36d5d644c7a81cdf6b95a1e3aa6c2f70d889654572d1f88f05e5b2c5f5c37d6570102c2525a9b3fa28a88c83ded573a896239900bd365dc0323d4921c3c96a3dae810479a1ac83b64f0f9b2008eb51832bce90105dab379b3d99f6761d4cf438d92356c563c982938fe83026258aad0a7d9f5eacfa359c68ec271d3ecf9a57d3eec56cb0bcf1bb0adc6c297d6e5b101640d3c5b50bcb54faebed4f850e737b5a2837054bccbecfd1c28e70a967a350d21867ea95b2cdfe55fd3edc6e1f4db06a5e6b77a333af48e92899e074794f3b4687dce6d45cb33433e922b1602e767164dc0e760d14b4c70f304de2cb56ca5ea35719f492480e48b9007e4073a8e02450a93d3932971b32aca283773bbb7974486478d380d8524c0eee27ba19d9c51196494bc3f2c41c1ddc72b0b9d97ca307022baf742cb69b45de669e3224c1eaf4e6ec7bb76f921ad3fd01e1138eda10e945ca95302c1729adf6526041169700a783f767632e99b55eac5e4ebc25b63e11649a31e1dba33445a36b40c7cc7ab6450cb4853c69a9f1eb00d466f6c98f297d3e4882fd4d1a9dff0786cece0dd1b03fd84f982b493349f32e49be255102e7bd1475e25574a992da6907a0e6bce48d4601b51ca05798a0e8b5faa9ed6700902e4626b866b4219e3880277bca07f577def954fdd64e089622ed0eec558759a9b6d3e512b330fa30e31403053a73da1747a7874f5b7a9fde4c0f9f29a27e795e275c9f6c33d9db7f370f148a790811428b2f96566bd0e2b148997e69b0ffe1a81cb04d43ce6a24ea2a9414b930fa1330153cb20aaae484e515393b9ddf9d029806c35d5e956462b7cc7f1c7995006ffeae1f1ba1daf8d43309198bf444ec82c670800d5dacd600924564931014b1e834a38274c6560784572e6d4bf8c4a5a1ee5edb2f4ea5fa9f07b11d3d1d88b993fa662bc04dfb9ffa9e534f1622efd7f823346aa7e0a988f56be531c73f34439df61f9737cca8b93d2c25695138c70c469298c3a114c89a8c3409d4dc18e7bd0158631d0b936823a6dda814ed50f83862058d1ecc19b2e1195c910edb5e7164fbd403de0beb5d7feec901a5a373afa1162be95f0e71e50d479e33494d7c98c1cb2ac886c81610678923685fa9f5fff2584c89130b7d2ac78317e531bb2fcade76520cf8bec450e31eebfa5ae2f78587c572d36d56a69cf3f2cc9e15b77c11877d27e8af0196902d7f94646f0294b4507ae4461397ef21b24a2142f740460e1eb1935cbaccd14f71f21d6fb7144de99154f037cf31e9f30da3c935950c7d1c859096d44b57e7bd37147304b2fe51ab63ca7c4031c1f07913c8a894a6b0573886d7a0a62cd20a0f433e541a43808465eb82af5bb9c819a74bed83cf91aa180442c28b9f4d69dd7e728c7734dd3bd3e277e67e96ab9f09e083c0a6e42fe2bc5dcae9a2deddb7f763e62b0d8adacc00af734bb9e978c160600611c83309468a2f942f5d2c9f7cafc97dae2f542ef33be39952fa70ee3e2ecb3105c1a490db73fcf46a3645de10e1cb335ea604f41d10b723872c26f20a71f44b1301fffd601c6a609e0d195bbcb1203cd23fdb3e3f59fa8ae5a484881c34706bacb6a479fa7c9cc6920613dd6903bf046493bac060f046efc6ce43aafe9a3b735c1cb283714548fdc16a2ce9d9dccd77f3b8037132ec1b1f1d965932a9ec4b20efe1f2212c94511b61799b5bd29be84e47d1c1209af544bb4c4820b4897fe00fd583b8ae5394354d1f2532d0801f202ba31bf01a896ebea5302167cf9b0ed71e793d9572fac48d75724caa57f99ba9db2113f5fa52d19356ed1d0c85bd60805952113e521a01444d6a6a502144691a9d32363284410e967626c720cdb3444a56b1b7043047dbf8e5f1b5177c82a651710eaed591e1d4ac5ffaf85411f7c3c3e58fefb5e0528f74b3f78a0b31de68f1e31415a7a37010be818b886c28cca1bf68db068929bad71bc6b4ae2a4c9f2c9bf98f15164e6ef96ef4121c191e5a94ca431b49c475f02acebc42d2c6026e4f7d595e5677947bf6cc0d6f95d7838f76cfc04492cebaed4374984706465ac83a1acbb55450f5b5e1e4cc00a88c334af44d337089c80167a813f54fa903ec85d8f1d22c443bcdfb3d268a3e57f563b9732cc3f5d8b1fd98a6f44e3b056cbeb65946ec917ef093c3a62757f2b27e6b4873ae7183b5b9a6528a576af69449df90cda4bfad6c54bed67fecc6fdc624183aecb5072002c8dc9d45505901c61489ab31b7d6cde6943f042953df648861b68663291117f3deb74d3f9e9501d9d50b095baaeef21aca82e00203c06ce103cc923e6f02ab481eed2da0a4eedeb827e9d7961f6d972f347c649e706dc0259d697a6a5ea1ba33a6f2c16beed92b58fa290026c728e91f3de285a74e56e968c5d174639a915b5e53d7b1e5566b1a89f09434afb2a2ff1fd00d13e7ce5a3dcb8e628f39a6c6825acd4b7152a777d21485f6360af8b1c62a4a29f2ad98d9c393530187c14b4defdfc8ac12433be7f56a40ce4087eb1f7cf949e4e9b3c612e4953716ab027a36ce839f1d2815c289d08e0e500630c2f54344d6549b9645a4b31648d25f71dc7a43651aa8530ccd0cec2f96a4385b185823111c514b5beb817a98824f301462598f03919ec52c0fdf5a522f3e4b250ded3089e0958bb20e5f936c8ab4fc00316ce483254f6e2abc024835acdba239decc60fcc316cbb5fe85db2e22ecd1259c607b575d836222d7a21f0fccdc6d4f90c487c66dcbe9d17f6af2edc30b57189f009072fa5b46e1f49aa33a6546aea60202c4e77066e2f487b2bd36f3178ea888488ae52fad830868172d8f2b3335db98a83c45e047ba93eb32e08a014d13fb8b9f3b54c16adaac8a95c250051baaa3667343a3df51ab7dccedcf4410482fb24ab337285d4c0d182bf00050c5cd2f8a1f7954fe0ce1c2325dc159445464327f0c463dfdae8c944db603ceab504409be7e3316e679960b63e1935018641f0d30d40fb4f83faa2786e7284b0adf6fe0ae04f61c362be89177aa7a27cd00a1c101deb33fbae04b8b20fceeef601049626954f0436470eb4d344fd53c34eab4fca401bb6aa64c1d1891ca88300ce5f8b9b7badb64a5aa3ce8ea848e288239def4602e4812c66503ccc2a68b734d97b2fe71e321e09275bbc727e4c02ce1a967f2f7c5f02f658c5e449a1c718a535561afbddd05ad28559c6ea8a5d19298eeccee69818b69a833b972128e153306522a3733396e25e3a2175443715b0926ea967609f73e2529fa4b6c346e32543431d11f57f557c71ff6b789d9a78e8039f78c5089586aeba7a584b3d6b753f8633d062b5cca3639eb95885027a1b78a90f79d33e8872b455a21618b76a4afd3d704849b067ab8f968bf528fbdbdfdd34e84163d644e211e32f9b5b91f86fb815890f6e405d7324fd6ff84fea268cf4d613d8b8cc784fd434f317dd77ccaf40d974c43d70ec15306c691ce9782267b20b35c150c1c104adff5437068f7c9dee058c08403024e5ed1f35bf1b6db213af8fd0293b230ddc7a405e1e3e584292cf6d9bd4ca1d0c325ecf37c57134320f79fac3f26874b1d595d0aacb7bf454bc4e15f755c1c7e2d0951d7731d8bf27c8002f611a942d633c9e0203ee9f848de15966e6c993d790bbc26958fdc3ff4e62b971697855ad0980d3cf6cd79c0f2f0d41eab6d2c67e83295afcbee60179e0997ddf9b15002b7fc058afa567034dabc640790aba2419a5ccbce25abccde586373f4e31f3436e5bab2e156b4cd6abaadbd4e991cb4a15cdea2202b13bce716e1df40d6bcc275f14c152ffe6294d2b5a5377a9da546490a0ff9ec3f27a0a6070f1b0d72b75a74ac1e764c4670b9547faa728500233dc410132d800bddd4e81272f1ace1fa8186e1b68e06000000000000009b094764fd0720212c14f12f1835596660e08dbaf1a28c2ecb391094e8decb500484a4f9de412781fe084695a243d474471a3d6abd4ac640cfb7da40e0327defce9aa8101a25f7145b55db0510dd090af63fd65f9003693b21b2f3d4775c65707fed78474238d6453592933b2265c3836d0c775b95e9739b3de3856072a5b43c9e3024e8843b2522e92d12aab4a636c68af12722ab38d881f4c97118014db986f3ec966783b93d81d1d70e3ea611482df745256c3ef9c6c949c6afc6929f69d9427ddde81f3f278500c586b3bb736c2fc7713ad92ed13640f4051e72b38568e3f211f75261ee6517de0b980076127d7dc00a1660a11232325f7ac097f46e0ef4493cd7de875d14056419373d887a821672d894d32c810464705e92c9abe32967fead2464c8b2f693f45d07a8160f59ec046019b016ee8b07764278af8c6b22b4cc079f406c0ba898332aa8911b026c75edd02d5a40f8ed9c1a3d39c1893a0affe4b38c77305429562e9d0907179753051cbf13ff936091334fe24a53816d2aa5e2e26993dac3f2c573b0001152ee26b633afd966bfb704054227160bf292bbcc35f78a649bb7f4fe1783a6b10de778519c8a71f1381cc67a779e51ce3097e666d964728d55708e76953826c7659c3647d3f3cedf9f1b45b27f5735bb8d78d874bf73147b738b9c0566a0d2fdcb17f85dc712462e381ba1466d92d903ba24d0cc17ddbeb7bd80b5525d7236a8add54d4eca06fe4cd0d3724403c7ad09f22eb2fcb4181eddde271be821579b7382bbfe36dab5079811e62842da65165c27c181dfed279d5ec12a1c0c13541760c2fe5cce95c6892622229ac24a7211ba43e513077f34342b61611a1ab10b6c51f6e3a06be0716d7d1abc82f5903e32f1e6e3e85789c1b8f140bbe1903b9677ec9655e171bf1f4d27dda003c27d4ef0e043d0def451dbc0f48cb6cb605b1e2d27e9fc9db10c0b571b6805f316b00b581d0d7358f83e14d1b4290e61fc0d0bd97334f31a547350c00877c90bcb591b98986c19d9d477f7dc521ac43d2edf9201ea61c43e6365e795bfb44b0d90ced7b9d34a849dec495d79cae7769c721d7cd17f1503df3d113c49fcb18449ff180d39c94717ae8fcba7ee1d8cf75873098a7a697d5f5d7a6eeef14daf146710ee40c94ff8ea9ff048d108688776fd074e72658d6ea43f42ea03883f70f45c7b86d3eb0bced0f3a60b6da510833728ffdb82af9a34c5fc86e0130861ac66c68b784300", "204b9e1804d636301150775298e6490040d0ecb72371cfe0ccc258d2b4450458b909ff0100000000000037ed25df0ce2b046ccc47e3501ed7a53e69d95dfb761f3fb81659983876f915b21b4b91270b4607875b751136514bb42b1de575e5ae05e98fd37dde49acb6a8e7f7c592ceb8793d00c84515e9b091fca8056f69ef47c1c91735af04b3077a94a24147489c6bbc3d63a76ba4eb1e6adf014106f4b0117fc6a2b2c84ca9e6c40fade373fd49f657e5e828399868d39d2a9d8cb3f4508e156d31ded826a64d84b19ceb0c13d9566f14866028f00408428bc6b9a27761fb13e70561fa8bb45bf2547baeebd7c99e01c1ebdac09ba75e3f67b2bc6898ca2c8e6c2b09efef1e688c74fe8e214b657d3325725531f9ce71d59532adc69f40e0b821fbd14558133f9fcd9d5ace9150703b5879f74028583dccd4984a9fedf23f1f6b8c501f9a99762079404f109e6d69b025edbf2d3169e44f186eb60e7abf9539cb8013670435420f54b7e485644f5afc2d0581d8404c23bcf2c0bcd6d3a6fbc658721e74546ea52d57f259e841e87f01ace9d7fb10bb4306abffa306d91963914bc144e486f78c048aafe20eae27ff53250de7bed8c4167780c53facfd741b93f53d67a60eba1527701896bcd29a6cc20b9390582421eb0e5dce7a66a94881904dd91c47c59e8b7219adae86ba78b230306829368a56dc908245fc72886c3b18facea659b27466d3c6a85b541f20a012660319f8f4ba0faf0d83d28ac63ae417323a0f75b88235d1a60a29c41f662b34ac40ac19c94f227567860a998f5e4d8f65b930c1a1209ba04cc2406599914e8ed7c98d8095a56fd29920c47c6221bf7e6a076dfc90947af9468d8844731ac3923896f25a8402421e24e1d328e5b9daeb97048b87e3d374874071931ad791c1f03324ba01d463364a5bb1dba7e3b807aec9c333703397a45918c73b443dd46f7b289736662ad833302fa89567e44c3de8e2f87bb5f8758abf6f888ad26bb5ed48a4bd828d8fcf5c01cf7588009c1a6c35e94142950b3bac8fa0af15c2f30504cef3e544b132e4096a836aa49336cbe878d2e33075d0712adc3e75b9f9bc7ec420f123084eb296119171535c4fa49d460d4444eb309f424ec13be89ff6641caa089da262ff89c0d4b1a86fac91361a7a124a0e4b27de253186e10671d2532d600f6b4089dc690f600363092ad93fb62fbab9e1a96caefe31e4c117420fd1df64e4e0cf4967cb026a003be444278553c2e58e19ec5a6db3921fab8fa0748965e523659e54a3e01190492f9b01811d06b13d8c833454ab5a93af8a9ad27a155d682d8c78f074da17d6ccb7ded5b5f3c30e3afb3c0e4aab6ce79e00d42df9a74f486aee74c0bc021c209000000f5e79678c45bac331d6ec24ecb404296dc9e90b2c191fc14c53505e92587f43a5eedc56a6408048d9dbb8bee8840a656952cb361f0d76baa20939e6e8ab917e12b76dd812b95e68c90708d7cd81aa18002eea116f4190e49d1f628a509c8fb65f393ef5bcf7d1b9ea289e0532ee5f46e65709e84aaa7a6334c58eaab5c3cced88fa3e9e365ace119a3c40dfe336abbe6d3a09dfd895cdc3daae26ae9d3f68a3a2184ac5f6972ef034f1f9f0d4100a55b8638db0986f362a23b599903909a5a6193fc2c6e54adc965ff5d48bc1ed1b6ff0ab226b9598f70a13ca0a0b2d2cc05f17449bd4cbd224fa75810955011d5a401348c0b75546c1fd86824ced7b0c79cb4d13a3722aef6f7a0cb49f76a372ff133736f04b67bf6a74d5164a227f4865dfd15181e0a9e5dc53317ffb04a7ab1fba87d3b34bd1cee7c6aef4b3ebef183c9fcd4daf091ef1f5f2709a7eb4a648242c408e7d5b10b766e0f648c2189c4956474892e379a84b1f09f13ba589423e43b4b0dd267b1d0c976fb64903ea2d22e2612d9dbad91536a986f44986d74578f2cf378dc6505cc26261548a080e11d74fed2cdaa90479f0656fd927f89a0624f4ce943981ffbec2ceb27c7fb6e6ee7df7c2d26d7151f1dadb172a0017787c5d32d6408b6662c8f5348f34e63649206142164f7aa076b2c83bfffe44126ee923f0b9bc917e52308373553cf19e6798ac83ace350be47f445ef0d268c2a4fc67998a5907db42decc63fcfc30df0a4543da178e442aec97060edc209e34849f6beea0e366eccc80b87c1c16f89e5608b96c176ccfaf6014a619b81d72c5a89749cf763fd76c6ae82b6a1322674838ab9e5f9a0db7aa8b7d27db308edb664fc0197756f6709df36d9f6ed678944e18455a8d49434f9a6f223cbf52b6a1ba266a55331ffe7e83fb4130c2f5528626c4e451d8bac1da046dd59249fe41b6c8a36e82346918e0177c876f44101ff9f7721d8fbe1eca04e13ba8db3f5bd01c3661df0d6c8a24d45a246e0ac80aed4178901a71a939da4622592b3a8d87b3ae35370530039d7d413455e9d61656b58a1e63aa9bf1a87d8bcc6605c3167836f82ba01f54934e2d31d7463e1848ee8a2cca55a029d5ed37236dda9f278981cdb330eabc6bfc33a7fee5678c38b8e0a9258fa8ce5cb8abc3320d44dd16098df1bbf9d3e3142ec1838ba81785e37dc97fda2797e3cf6b7d6c367737b4df96a242149bbba7af54da91b404fbf01f4ecfb7ebd97c67de2415b3bca3b5f21deae988733dcb547a17aa38c0b98aba60fbb1d57f9e8f005ae6233e5da68da32c7a2778944a2eacba03e3312fe968fa3be0e2ceb4d8526803e7a8f24618b1003860e424da518c9602cb092c9c6b930b72523abf615ad8330e337e64ff82eb78d9a2384e86afece8aa9d9cb1b7ab27265261a3cf542e1655792ed66b28d27bf4f02d13e93413bfc5fae7dbec15aac85331ae3d4032679988ffd1c1750447f763ebc9ba8f8ba4521b74563af6ee8a996af3707dd03118c3f0d18d612a5105519310f7b8c5eb4b7e3a0d675374da18314d144b5d5d0ba2735dab4efdf68f78285ce4d35032427e23fe7c59c5844879550417dc93d2221fe0ff82c7e21ebba19c01fefc6f6eeb7078e7557f077ca089246e6f3901e127ca4685c191847ae720ce30d41939239b2835d9cfd126faabc88eb80d409d8ec1cdf6070c55109bdbbb668fd56c6ebd3503986cdf5ade19903a85516f0ed87872f397e6244b0f58c70b8dd0cbc408dd7a87c42d672d31fde7fbc31b3acff4be744b933ec0645f76b52481ba6f50a25a98f89d9989e347b682a459eb38004d0de0a7314f8319b1e0ce5152a4928d7f59769347a7f48af595d028b5012cf5b7fc081cbec3c5ad30801947b5d3f87a242b05691ef3f46f0ba35fa6ee28a966ad42e34ef6192cb6e5de41411df4638c825688abc1c8f1fa7b2eced5ae40a5d35d7cfd981f4dd46a91e8f123187d8e99a947020cdc4cfcb66ee004232ed5badfa694fd943ed59f01433989e5663a77fd2bbcdbfaad5ab482150f22ffa6b1ae9e99134b320c04444c3d5d71e37c6d4faf82b1297d75a520e6e6c5a0d7ab9fe83621702ef3507690f50e9abd452da33c58974cb63e4711fece83cf1251c6eecc7c9a887b0a881f148b6c8fa3749ef09661488909a2f74e41a4968f5f1d1ebd9a511f5732ed60a18032d68dcf34a5914b1c24275e6c3d331a8c454e4c615db1f6ce4de1b44fc755da73eef517bca08fa464443eabf4046961625ee82c406e08359b49785a1cbe9822cada3375da9adf55bd50e156a314f10107a3fb880a944fa3a0cdb4be2234c19ab26f8075c6389a0a6062e82050b493a30e617f728b8d0ced0b69da60c6fdadd95ee1c0e656b63ecc72a491e07bce4c3df3761e51bb327a86d55a375e4f5859a8b179a47f4b5b8b85fed0db916e31885d0ad185d6c7e79449e282a5d10a7cf86d0305a2673cd9aa834d130fcb1098c0f69771ae23e2b49cdd3d39be17fcc309a282486bf0e0829a0805a036b0b1e357f03a861857312dab3033f00957ff6f03a35240724bc6adf429090f555aca563ffb5e4b67c75486149f2495971bf653617f29e50d59da32288afeabc768787d2e830c70d5f0dbd8db5e9923b8893f32c4cdc0d8130caefade59d7f5e270f8b5487b69815dd8cec6d3dfa3ca308987f2970ab3e8714cdbae27dc22fa434805c9284b904840a92bc76490c15c6a04df137940d48f7ac6285f858611376f447ebaf11ce4014066d57e5fa579b588e0d795fb0322d1b8606faf9507092be3e320184a5324df47792e8b015ee27ace73b0bc05f3eff2c2a9ee45752df32a85b1ad5679aedbe40ac59511938929e210a409e538c139d1fb93891d2b9908f915b9c556788bb8926b6a96923038a119eb68bcb528a42e97f8fbd49e7d5bb3e51987cca590ea8a18e049f64d8c994d63a707c441e63509f909adf5f7c26d36714bd55607513003f8f85f20c8fea4248627d2f19891baef9b134a8ecb6e3da6232c5b818d7469645038312b6b952f782f28ccd199367a51f750927e5f11ef04cb299dc7ba0c24500134d3a9a0a4f62903ae930f5ba49c39855ffc4aba6cc9d400075f094875db9ebcbcbb35309421d08a928b0216dcbbf718761b01b4d41cf55b0b2bf4c89603a61e5ac2f5bf5236d4bee90617e1b2fdc3a4540db2c89561c1cb9b1e28436013546e654e36fa328097ce8a4baf5a2fd78f9bca617bd4de062dbbc38c7356232b385823b6c604a401f43f5864111eff29045c12b6c622182e097caa5a9945133375b46dc0e268e860dd58b62403c41393f02c7f1d23a1d0daad5d2eb7a085387ea6b81ceb6191d5ffa7f58848996caad4796ee8d9e1bad072455a37d8b64888cb4007f344783afca22db07a2ccb8531c6a9ec9bffdf1f949e3fce89f623119595c5b9bfa51893ff36849be61ff02939360a5d5b0e05d22aa3a1f16c27103edeb00c0f763bd4251805ec8d894692cd1636b4b1c96ab613896c17b2fb8a414a91463d54f145e1d49378e726e5921d8cd34aeb176a36701c9b75311806efcf402d4345034d7fd5165857bd2cd07b32a18334a3cf358dadbc8144b806120805a07714d8d0029fe0db7958bbb69b9a216e5945fdf0b892665c0bad2cd822797d5c7223094cd54042c781fba9d7f05a169f390225385d5c055896dc8a620a637a7c73ee77fbf2152fb62af9bcbe01389dd846724fa24ca6088d2bddf9bcae4d9e11f86266e4d87f6b11f3721c30c3f48ddfecb7623802c7e3f595b088473746d25b70bbdf8920924c6bb9e202e6d54e340a469e8ecf66b49dda0036a7d071492742593c2e02bd7bd703774f2ac8c45dbfa1f8ce4c205a05064362bf2819e80bd406367a86ece3f5d54b43029b3f7fcc2378c5e33e8de66fa5f3c4974310c3ac4d2ab1234b1fea14d71512c578dfab154a74dc66c8a5ff983a41e02c57c58cd9c3a77d22f15f8a6abe41de51ce4a921591ebba872c4feb0453b4f86fb4c7e19063b871ff6458b2ad51b992df6b16de3a5a2f5935c85d5a8709d82943c645f6199e76b38d718b86945638d92daa15aeb9beaa53028a425c6ee90dbd58b57f4a748ec0037fca725812aaac8e201d5121c06c9d3bfcbe799b9fa28440fceec7885d39a112626bd0f9e530cb5573083e6b3b0ce5ef60e85ea643331d45663f309d75d36c88ed56abbac74672daa72c2f180ab5d117d2ab17db9e36a807bcaa62a07aa5486d39d63f64d23f03e58f6fa346b39005cde05121ecc2146ae982d02532a2deb90d8b9cfd32ff03a5294933292fb3d58760bc81a72df0e602b9b4b7e407bc542924e9763fe0d4bd5346ccb9e10b1ea7dade31d4bbc900"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) vmsplice(r3, &(0x7f0000000300)=[{&(0x7f0000000000)="f56a143afd402f32093b29017be9a6c45d0c32c8ab8cda04fc1a7101c5f35c88e1101c063e856c", 0x27}, {&(0x7f0000000180)="fc9e134f2dafddc85a50e30bb86c50e27c4bec9a5e772246f162d6598960d668ce8dfb6a7c543998787f6d3c535e6e061b631b80ffdf4c3d78222ef1c4be152cc48136dde1e573440f026c5d4d8ccbcb097fb22826c82fc766ada5701c83b598019aa50814c5d7dff0f5b132a3f3d3b4153ab146e7e3ee99050ffe9d8ae51b50f47d57bd129096b61a0b6c320713cc9745a7ca8a1ce0391c19aa1ab0b4263d751e06e70b44616ea6a93a28d2e7ab5e1b5a97e7e4b0c879d1bef61610d5547ab2d0d3cc5b75c09f863b4db7997b8a97cc6569eb2947066189e60699686e8f20184449eaeb4bae4b0a01e3ed", 0xeb}, {&(0x7f0000000080)="513f6abf2c40ebe6a04fa2d00d295e363ba69040e3355848a59cbe1c9e9db17c0f83275bc8f974121b206cfbc7c08b5e2de6fc9d3a9634710a999b53964a1f8d86412d14e6f3151f1fc292dc623ec06fa64f2ff329beac4ef56291f9974103c64cbe80ee63b3868a544b76ae5430", 0x6e}, {&(0x7f0000000280)="06662833e475ea32a528f04088481dcbd87f49204e025a40b00c23b2ed141819daea7d8c1a6bf837059af8609bc4aff0e41314f2f91482b7c69ac24136a1cc83a189cd0a4b49bb0da8821e8e7096685ccfcfa5ea2b29eb84a51b2169027149c5327eb8956cdd134414190ddafe8e05f2e098776e4404a362d5", 0x79}], 0x4, 0x3) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 14:59:13 executing program 0: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40980}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nf_conntrack\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 14:59:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f00000005c0)=""/221, 0xdd}, {&(0x7f0000000280)=""/209, 0xd1}, {&(0x7f0000000380)=""/187, 0xbb}, {&(0x7f0000000440)=""/252, 0xfc}, {&(0x7f0000000000)=""/5, 0x5}], 0x5, 0x0, 0x0) 14:59:13 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0xf502, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 14:59:13 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)={0x101, 0x4f, "d3724cc249f248c121e484968a3620f6e0dbe2137524adbda76697411a67876bb25f7f9bbc541865408533a0d62e7057b2f02ff271620bc0c249ff9bcb8a3f2e7f15f9176ec14718856eed2ccbfc6a"}) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffef, 0xffffffffffffffff, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r1, &(0x7f00000017c0), 0x16b, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 14:59:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') clone(0x10200000, &(0x7f0000000180)="ed861197e5a40afebc3f470b79968ff8813f81a04764a4fcb48168f54d07d793b785c518669df03b53ae3be7ca899525134cf9b816a2efd2253f16e06856b4eb045b2ad0077d757e2643cec08304ca6e229a5607e26ef5c2caf1812e8478c7435fcc5cf1189e93437734967c5f1ce08a5fe6a518ce5d19c9b862698ee3f9dfe122d0aa9590ca0e0fd4cf773368c35509778f3831d259dfba4d163f2b4c20fc204301273d5eabfa72eb4cc8932e1f8cc3d91cf47dfd1dc038eea14e3082176f61970025d90ba6004e01480000000000000000", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000280)="ea1881bb874849f62f0bb550dea6fe2968d95b84486b44ddce879f38aa32e13aa2a6765e58a0218e54f138821101393f76307b0d4be3578fd29f44908941088e9a7e38f092cf3436ceb517316ea553eb004d4475f3e93d9fe3e2c6ad461b1dbe3c109bc79d83757507e11cd56336a916d4cb0db0d57b51379190cbdf2a") preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) [ 567.589183] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 567.596522] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 567.605670] device bridge_slave_1 left promiscuous mode [ 567.611537] bridge0: port 2(bridge_slave_1) entered disabled state [ 567.619254] device bridge_slave_0 left promiscuous mode [ 567.624707] bridge0: port 1(bridge_slave_0) entered disabled state [ 567.662988] device hsr_slave_1 left promiscuous mode [ 567.672006] device hsr_slave_0 left promiscuous mode [ 567.684062] team0 (unregistering): Port device team_slave_1 removed [ 567.694756] team0 (unregistering): Port device team_slave_0 removed [ 567.703525] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 567.714198] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 567.739735] bond0 (unregistering): Released all slaves [ 568.877677] IPVS: ftp: loaded support on port[0] = 21 [ 569.000053] chnl_net:caif_netlink_parms(): no params data found [ 569.054888] bridge0: port 1(bridge_slave_0) entered blocking state [ 569.061907] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.069183] device bridge_slave_0 entered promiscuous mode [ 569.075729] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.082336] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.089669] device bridge_slave_1 entered promiscuous mode [ 569.112265] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 569.121017] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 569.142202] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 569.149351] team0: Port device team_slave_0 added [ 569.154689] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 569.162049] team0: Port device team_slave_1 added [ 569.181706] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 569.188013] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 569.213330] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 569.224610] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 569.230943] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 569.256200] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 569.267103] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 569.274344] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 569.297963] device hsr_slave_0 entered promiscuous mode [ 569.303556] device hsr_slave_1 entered promiscuous mode [ 569.309743] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 569.316666] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 569.392952] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.399347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 569.405907] bridge0: port 1(bridge_slave_0) entered blocking state [ 569.412302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 569.442762] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 569.449767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 569.458375] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 569.466499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 569.474875] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.482121] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.492740] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 569.498963] 8021q: adding VLAN 0 to HW filter on device team0 [ 569.507284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 569.514927] bridge0: port 1(bridge_slave_0) entered blocking state [ 569.521337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 569.530867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 569.538606] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.544944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 569.564002] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 569.574046] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 569.585411] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 569.592574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 569.600482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 569.608796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 569.616241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 569.623947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 569.631062] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 569.643495] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 569.651434] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 569.658177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 569.671113] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 569.724661] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 569.734455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 569.766095] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 569.773376] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 569.781471] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 569.792454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 569.800341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 569.807874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 569.816580] device veth0_vlan entered promiscuous mode [ 569.825542] device veth1_vlan entered promiscuous mode [ 569.831905] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 569.840690] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 569.853990] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 569.864207] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 569.871782] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 569.879568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 569.889737] device veth0_macvtap entered promiscuous mode [ 569.895772] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 569.905718] device veth1_macvtap entered promiscuous mode [ 569.914694] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 569.924198] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 569.933036] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 569.943391] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 569.952598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 569.962414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 569.971605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 569.981408] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 569.990569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 570.000354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.009797] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 570.019596] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.030051] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 570.038142] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 570.045179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 570.056907] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 570.066354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 570.076150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.085503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 570.095291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.104452] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 570.114270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.123583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 570.133388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.142573] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 570.152829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.162784] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 570.169858] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 570.177389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 570.185190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 14:59:18 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:18 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)={0x101, 0x4f, "d3724cc249f248c121e484968a3620f6e0dbe2137524adbda76697411a67876bb25f7f9bbc541865408533a0d62e7057b2f02ff271620bc0c249ff9bcb8a3f2e7f15f9176ec14718856eed2ccbfc6a"}) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffef, 0xffffffffffffffff, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r1, &(0x7f00000017c0), 0x16b, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 14:59:18 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r0, 0x1b) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) fallocate(r1, 0x16, 0x6, 0x1f71) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r2, &(0x7f00000017c0), 0x16b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000000c0)='\x00') 14:59:18 executing program 0: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$vim2m_VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0x3, 0x2, 0x4, 0x10000, 0x4, {}, {0x1, 0x8, 0x3f, 0x3, 0x5, 0x7f, "1e0a621f"}, 0x3ff, 0x4, @userptr=0x7, 0xb92, 0x0, 0xffffffffffffffff}) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000280)={0x7ff, 0x1, 0x4, 0x100000, 0x5a66dbec, {r0, r1/1000+10000}, {0x5, 0x1, 0x9b, 0x3f, 0x3, 0xc9, "54ade23c"}, 0x7, 0x0, @planes=&(0x7f00000001c0)={0x7ff, 0x3, @mem_offset=0x61f2, 0x4a}, 0x3, 0x0, r2}) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0xb0102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a637000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf921e884bf496dca5d2b316da4f0de8163f6242fa7323f1740637c48468766aecf3c0653a7496c01af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x400, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r6 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000056c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003400)=[{0x80, 0x10a, 0x3, "23b428473dbbe9f968464bb38c690a88a06604721483715fc8074cf0cb95dcb09670467ba86517d3f3b78dc8f37c8059a01f1cff2c20e107400beed6979a907db6e38ba72f9e63bd9985d787a43006b2d6ff224dcd316345b1a105e179b89d58e955ba81503ee2836fe1"}, {0x10}, {0x10, 0x10b}], 0xa0}, 0x4000000) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000001d80)=r5, 0x4) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000001bc0)={&(0x7f0000000200)=@generic={0x11, "76810ba877d3424eb9426d1a374d2ec34b7295e1e9b968357cf60b8f06907b7cc9121ab0ba40d78a3cfd16d1479e4965948ffd2045b89a8e517bef7b27f5d9e0cd000ccce4c1b5ec0826475f050b455add6f5543e67f36992b826cf8967a15997fa358d24e27886ae051e46daa97673788562bc192dbf2459cf234bec0c4"}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000000)="141db64c4812b088af602859978f21f5d4d95424dff934e4562444f07c4e68f4eb0a75d06b2e9a1b39bbe755f40c92511ad4c33a48cc4e5719730d13f3b8", 0x3e}, {&(0x7f0000000780)="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", 0xc00}, {&(0x7f0000000080)}, {0x0}, {&(0x7f0000001840)="daf1b831458c25c9c1dcfcd1be219a486583920aa2dbff790a70600cdec3691b9eb940d5d779ef8207973a9f04ec0b77576adaf8903bb7c45034518760fca70db0ea2ca8593e04056ab6051edbc302ccd71ccdc8875298fb2f4845f34d7cc13a0472c85ea95a0d41c6c8db4be033ed2eb21545362a4797f4be2672af4fd516f57ee916ee", 0x84}, {&(0x7f0000000280)}, {&(0x7f0000000440)}, {&(0x7f0000001900)="2558d5874f36c8492ac7eef70508c352ee9b9496476c91d6739e9f0dbe11bef61fa98987651c0eabb7562ab0ec92c69f7de42f6976033463c3ebba18df9cd7313bed8f00bf58947e4257118614c4cf0034bbbf70ff980a3de2fa81f4227c8cacd27bf64654864a5c10", 0x69}, {&(0x7f0000001980)="bd56a5facc75cd3844d9b0fd6536a5178daf76c6210c4a82d2d47a7d71ac4fdf6c4b47169d71887f2df41092f6c9124ff225e5fc96288b16691fbae330d6c99591fe39f1e1b96800e55c73100d51799850567e91cde10030620f505e31e2f05aaf045e2993f0aac4e39e352c4850e2a8b7b544117df0ea62964c9174443bad8df0f17ba2c5c7a3adc9d43b784020961b2a1cc20eec15790795e2663df5da291c63a92bd49125af7ea12cca4f147aad6dec", 0xb1}, {&(0x7f00000005c0)=':', 0x1}], 0xa, &(0x7f0000000080)=[{0x68, 0x101, 0xfffffffb, "a3bf0fa961b52d97f8d413f8ba776f47297648c6f7d6909b0164bf3a40d3b2147252be1c10317b148e40ffbbdd578d9e0843cf31cfef664410bf25bbb7a2eb5b7d6090794d882d956b987ff90f8cdfcb17ad"}], 0x68}, 0x4000080) setsockopt$sock_attach_bpf(r4, 0x1, 0x2f, &(0x7f0000000040), 0x2e) 14:59:18 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0xf502, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 14:59:18 executing program 3: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 14:59:18 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:59:18 executing program 0 (fault-call:7 fault-nth:0): r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:59:18 executing program 2 (fault-call:5 fault-nth:0): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) [ 570.366798] FAULT_INJECTION: forcing a failure. [ 570.366798] name failslab, interval 1, probability 0, space 0, times 0 [ 570.423799] CPU: 1 PID: 2371 Comm: syz-executor.1 Not tainted 4.14.231-syzkaller #0 [ 570.431640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.441005] Call Trace: [ 570.443609] dump_stack+0x1b2/0x281 [ 570.447253] should_fail.cold+0x10a/0x149 [ 570.449014] FAULT_INJECTION: forcing a failure. [ 570.449014] name failslab, interval 1, probability 0, space 0, times 0 [ 570.451422] should_failslab+0xd6/0x130 [ 570.451431] __kmalloc+0x2c1/0x400 [ 570.451440] ? SyS_memfd_create+0xbc/0x3c0 [ 570.451449] SyS_memfd_create+0xbc/0x3c0 [ 570.451457] ? shmem_fcntl+0x120/0x120 [ 570.451466] ? __do_page_fault+0x159/0xad0 [ 570.451473] ? do_syscall_64+0x4c/0x640 [ 570.451480] ? shmem_fcntl+0x120/0x120 [ 570.451487] do_syscall_64+0x1d5/0x640 [ 570.451497] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 570.451504] RIP: 0033:0x466459 [ 570.451509] RSP: 002b:00007fed527d5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 570.451518] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 570.451522] RDX: 000000000000c000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 570.451527] RBP: 0000000000000004 R08: 0000000000006000 R09: ffffffffffffffff [ 570.451531] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 570.451535] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 [ 570.496383] FAULT_INJECTION: forcing a failure. [ 570.496383] name failslab, interval 1, probability 0, space 0, times 0 [ 570.498853] CPU: 0 PID: 2384 Comm: syz-executor.5 Not tainted 4.14.231-syzkaller #0 [ 570.498859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.498862] Call Trace: [ 570.498878] dump_stack+0x1b2/0x281 [ 570.498889] should_fail.cold+0x10a/0x149 [ 570.498900] should_failslab+0xd6/0x130 [ 570.498918] __kmalloc+0x6d/0x400 [ 570.597201] ? tty_buffer_alloc+0xc0/0x270 [ 570.601431] tty_buffer_alloc+0xc0/0x270 [ 570.605484] __tty_buffer_request_room+0x12c/0x290 [ 570.610412] tty_insert_flip_string_fixed_flag+0x8b/0x210 [ 570.615947] pty_write+0x10d/0x1d0 [ 570.619511] tty_put_char+0xfe/0x120 [ 570.623215] ? dev_match_devt+0x80/0x80 [ 570.627189] ? pty_write_room+0xa9/0xd0 [ 570.631150] ? ptmx_open+0x300/0x300 [ 570.634854] __process_echoes+0x48c/0x8c0 [ 570.638993] ? mark_held_locks+0xa6/0xf0 [ 570.643048] process_echoes+0xe9/0x1a0 [ 570.646928] n_tty_set_termios+0x60f/0xcc0 [ 570.651153] ? process_echoes+0x1a0/0x1a0 [ 570.655291] tty_set_termios+0x5d5/0x810 [ 570.659353] ? tty_wait_until_sent+0x470/0x470 [ 570.663937] set_termios.part.0+0x244/0x3f0 [ 570.668253] ? set_termiox+0x280/0x280 [ 570.672140] tty_mode_ioctl+0x94b/0xa80 [ 570.676107] ? get_termio+0x240/0x240 [ 570.679900] ? __ldsem_down_read_nested+0x91/0x610 [ 570.684822] ? __ldsem_down_read_nested+0xb0/0x610 [ 570.689746] ? _parse_integer+0x130/0x130 [ 570.693887] ? __might_fault+0x177/0x1b0 [ 570.697948] ? __ldsem_down_write_nested+0x700/0x700 [ 570.703078] n_tty_ioctl_helper+0x44/0x350 [ 570.707307] n_tty_ioctl+0x47/0x2e0 [ 570.710941] tty_ioctl+0x5af/0x13c0 [ 570.714564] ? n_tty_poll+0x7d0/0x7d0 [ 570.718358] ? tty_fasync+0x2c0/0x2c0 [ 570.722154] ? proc_fail_nth_write+0x7b/0x180 [ 570.726661] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 570.731604] ? trace_hardirqs_on+0x10/0x10 [ 570.735834] ? fsnotify+0x974/0x11b0 [ 570.739540] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 570.744459] ? __handle_mm_fault+0x80f/0x4620 [ 570.749052] ? SyS_write+0x1b7/0x210 [ 570.752757] ? tty_fasync+0x2c0/0x2c0 [ 570.756549] do_vfs_ioctl+0x75a/0xff0 [ 570.760351] ? ioctl_preallocate+0x1a0/0x1a0 [ 570.764756] ? lock_downgrade+0x740/0x740 [ 570.768907] ? __fget+0x225/0x360 [ 570.772352] ? do_vfs_ioctl+0xff0/0xff0 [ 570.776320] ? security_file_ioctl+0x83/0xb0 [ 570.780719] SyS_ioctl+0x7f/0xb0 [ 570.784077] ? do_vfs_ioctl+0xff0/0xff0 [ 570.788049] do_syscall_64+0x1d5/0x640 [ 570.791933] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 570.797146] RIP: 0033:0x466459 [ 570.800327] RSP: 002b:00007fe991470188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 570.808029] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 570.815324] RDX: 00000000200004c0 RSI: 0000000000005406 RDI: 0000000000000003 [ 570.822602] RBP: 00007fe9914701d0 R08: 0000000000000000 R09: 0000000000000000 [ 570.829868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.837129] R13: 00007ffc064a5c5f R14: 00007fe991470300 R15: 0000000000022000 [ 570.844410] CPU: 1 PID: 2385 Comm: syz-executor.2 Not tainted 4.14.231-syzkaller #0 [ 570.844412] [ 570.844419] ====================================================== [ 570.844422] WARNING: possible circular locking dependency detected [ 570.844424] 4.14.231-syzkaller #0 Not tainted [ 570.844426] ------------------------------------------------------ [ 570.844429] syz-executor.5/2384 is trying to acquire lock: [ 570.844430] (console_owner){-.-.}, at: [] vprintk_emit+0x32a/0x620 [ 570.844437] [ 570.844439] but task is already holding lock: [ 570.844440] (&(&port->lock)->rlock){-.-.}, at: [] pty_write+0xdb/0x1d0 [ 570.844446] [ 570.844449] which lock already depends on the new lock. [ 570.844450] [ 570.844451] [ 570.844454] the existing dependency chain (in reverse order) is: [ 570.844455] [ 570.844456] -> #2 (&(&port->lock)->rlock){-.-.}: [ 570.844464] _raw_spin_lock_irqsave+0x8c/0xc0 [ 570.844466] tty_port_tty_get+0x1d/0x80 [ 570.844469] tty_port_default_wakeup+0x11/0x40 [ 570.844471] serial8250_tx_chars+0x3fe/0xbf0 [ 570.844474] serial8250_handle_irq.part.0+0x28d/0x330 [ 570.844476] serial8250_default_handle_irq+0x8a/0x1f0 [ 570.844479] serial8250_interrupt+0xf3/0x210 [ 570.844481] __handle_irq_event_percpu+0xee/0x7f0 [ 570.844483] handle_irq_event+0xf0/0x250 [ 570.844485] handle_edge_irq+0x224/0xc40 [ 570.844487] handle_irq+0x35/0x50 [ 570.844489] do_IRQ+0x93/0x1d0 [ 570.844492] ret_from_intr+0x0/0x1e [ 570.844494] native_safe_halt+0xe/0x10 [ 570.844496] default_idle+0x47/0x370 [ 570.844498] do_idle+0x250/0x3c0 [ 570.844500] cpu_startup_entry+0x14/0x20 [ 570.844502] start_secondary+0x4db/0x670 [ 570.844505] secondary_startup_64+0xa5/0xb0 [ 570.844506] [ 570.844507] -> #1 (&port_lock_key){-.-.}: [ 570.844515] _raw_spin_lock_irqsave+0x8c/0xc0 [ 570.844517] serial8250_console_write+0x7a7/0x9d0 [ 570.844519] console_unlock+0x99d/0xf20 [ 570.844521] vprintk_emit+0x224/0x620 [ 570.844523] vprintk_func+0x58/0x160 [ 570.844525] printk+0x9e/0xbc [ 570.844527] register_console+0x6f4/0xad0 [ 570.844530] univ8250_console_init+0x2f/0x3a [ 570.844532] console_init+0x46/0x53 [ 570.844534] start_kernel+0x52e/0x770 [ 570.844536] secondary_startup_64+0xa5/0xb0 [ 570.844537] [ 570.844539] -> #0 (console_owner){-.-.}: [ 570.844545] lock_acquire+0x170/0x3f0 [ 570.844547] vprintk_emit+0x367/0x620 [ 570.844549] vprintk_func+0x58/0x160 [ 570.844551] printk+0x9e/0xbc [ 570.844553] should_fail.cold+0xdf/0x149 [ 570.844556] should_failslab+0xd6/0x130 [ 570.844557] __kmalloc+0x6d/0x400 [ 570.844560] tty_buffer_alloc+0xc0/0x270 [ 570.844562] __tty_buffer_request_room+0x12c/0x290 [ 570.844565] tty_insert_flip_string_fixed_flag+0x8b/0x210 [ 570.844567] pty_write+0x10d/0x1d0 [ 570.844569] tty_put_char+0xfe/0x120 [ 570.844571] __process_echoes+0x48c/0x8c0 [ 570.844573] process_echoes+0xe9/0x1a0 [ 570.844575] n_tty_set_termios+0x60f/0xcc0 [ 570.844578] tty_set_termios+0x5d5/0x810 [ 570.844580] set_termios.part.0+0x244/0x3f0 [ 570.844582] tty_mode_ioctl+0x94b/0xa80 [ 570.844584] n_tty_ioctl_helper+0x44/0x350 [ 570.844587] n_tty_ioctl+0x47/0x2e0 [ 570.844589] tty_ioctl+0x5af/0x13c0 [ 570.844591] do_vfs_ioctl+0x75a/0xff0 [ 570.844593] SyS_ioctl+0x7f/0xb0 [ 570.844595] do_syscall_64+0x1d5/0x640 [ 570.844597] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 570.844599] [ 570.844601] other info that might help us debug this: [ 570.844602] [ 570.844604] Chain exists of: [ 570.844605] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 570.844615] [ 570.844617] Possible unsafe locking scenario: [ 570.844618] [ 570.844620] CPU0 CPU1 [ 570.844623] ---- ---- [ 570.844624] lock(&(&port->lock)->rlock); [ 570.844629] lock(&port_lock_key); [ 570.844634] lock(&(&port->lock)->rlock); [ 570.844638] lock(console_owner); [ 570.844642] [ 570.844644] *** DEADLOCK *** [ 570.844645] [ 570.844647] 5 locks held by syz-executor.5/2384: [ 570.844648] #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x22/0x80 [ 570.844656] #1: (&o_tty->termios_rwsem/1){++++}, at: [] tty_set_termios+0xd3/0x810 [ 570.844665] #2: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref+0x1b/0x80 [ 570.844673] #3: (&ldata->output_lock){+.+.}, at: [] process_echoes+0x9f/0x1a0 [ 570.844681] #4: (&(&port->lock)->rlock){-.-.}, at: [] pty_write+0xdb/0x1d0 [ 570.844688] [ 570.844690] stack backtrace: [ 570.844693] CPU: 0 PID: 2384 Comm: syz-executor.5 Not tainted 4.14.231-syzkaller #0 [ 570.844697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.844699] Call Trace: [ 570.844701] dump_stack+0x1b2/0x281 [ 570.844704] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 570.844706] __lock_acquire+0x2e0e/0x3f20 [ 570.844708] ? trace_hardirqs_on+0x10/0x10 [ 570.844710] ? kvm_clock_read+0x1f/0x30 [ 570.844712] ? vprintk_emit+0x342/0x620 [ 570.844714] lock_acquire+0x170/0x3f0 [ 570.844717] ? vprintk_emit+0x32a/0x620 [ 570.844719] vprintk_emit+0x367/0x620 [ 570.844721] ? vprintk_emit+0x32a/0x620 [ 570.844723] vprintk_func+0x58/0x160 [ 570.844724] printk+0x9e/0xbc [ 570.844726] ? log_store.cold+0x16/0x16 [ 570.844728] should_fail.cold+0xdf/0x149 [ 570.844730] should_failslab+0xd6/0x130 [ 570.844732] __kmalloc+0x6d/0x400 [ 570.844735] ? tty_buffer_alloc+0xc0/0x270 [ 570.844737] tty_buffer_alloc+0xc0/0x270 [ 570.844739] __tty_buffer_request_room+0x12c/0x290 [ 570.844742] tty_insert_flip_string_fixed_flag+0x8b/0x210 [ 570.844744] pty_write+0x10d/0x1d0 [ 570.844746] tty_put_char+0xfe/0x120 [ 570.844748] ? dev_match_devt+0x80/0x80 [ 570.844750] ? pty_write_room+0xa9/0xd0 [ 570.844752] ? ptmx_open+0x300/0x300 [ 570.844754] __process_echoes+0x48c/0x8c0 [ 570.844756] ? mark_held_locks+0xa6/0xf0 [ 570.844759] process_echoes+0xe9/0x1a0 [ 570.844761] n_tty_set_termios+0x60f/0xcc0 [ 570.844763] ? process_echoes+0x1a0/0x1a0 [ 570.844765] tty_set_termios+0x5d5/0x810 [ 570.844767] ? tty_wait_until_sent+0x470/0x470 [ 570.844770] set_termios.part.0+0x244/0x3f0 [ 570.844772] ? set_termiox+0x280/0x280 [ 570.844774] tty_mode_ioctl+0x94b/0xa80 [ 570.844776] ? get_termio+0x240/0x240 [ 570.844778] ? __ldsem_down_read_nested+0x91/0x610 [ 570.844780] ? __ldsem_down_read_nested+0xb0/0x610 [ 570.844782] ? _parse_integer+0x130/0x130 [ 570.844785] ? __might_fault+0x177/0x1b0 [ 570.844787] ? __ldsem_down_write_nested+0x700/0x700 [ 570.844789] n_tty_ioctl_helper+0x44/0x350 [ 570.844791] n_tty_ioctl+0x47/0x2e0 [ 570.844793] tty_ioctl+0x5af/0x13c0 [ 570.844795] ? n_tty_poll+0x7d0/0x7d0 [ 570.844797] ? tty_fasync+0x2c0/0x2c0 [ 570.844800] ? proc_fail_nth_write+0x7b/0x180 [ 570.844802] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 570.844804] ? trace_hardirqs_on+0x10/0x10 [ 570.844806] ? fsnotify+0x974/0x11b0 [ 570.844809] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 570.844811] ? __handle_mm_fault+0x80f/0x4620 [ 570.844813] ? SyS_write+0x1b7/0x210 [ 570.844815] ? tty_fasync+0x2c0/0x2c0 [ 570.844817] do_vfs_ioctl+0x75a/0xff0 [ 570.844819] ? ioctl_preallocate+0x1a0/0x1a0 [ 570.844821] ? lock_downgrade+0x740/0x740 [ 570.844823] ? __fget+0x225/0x360 [ 570.844825] ? do_vfs_ioctl+0xff0/0xff0 [ 570.844827] ? security_file_ioctl+0x83/0xb0 [ 570.844829] SyS_ioctl+0x7f/0xb0 [ 570.844831] ? do_vfs_ioctl+0xff0/0xff0 [ 570.844833] do_syscall_64+0x1d5/0x640 [ 570.844836] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 570.844838] RIP: 0033:0x466459 [ 570.844840] RSP: 002b:00007fe991470188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 570.844845] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 570.844849] RDX: 00000000200004c0 RSI: 0000000000005406 RDI: 0000000000000003 [ 570.844852] RBP: 00007fe9914701d0 R08: 0000000000000000 R09: 0000000000000000 [ 570.844855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.844858] R13: 00007ffc064a5c5f R14: 00007fe991470300 R15: 0000000000022000 [ 570.884841] FAULT_INJECTION: forcing a failure. [ 570.884841] name failslab, interval 1, probability 0, space 0, times 0 [ 570.890922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.890926] Call Trace: [ 570.890944] dump_stack+0x1b2/0x281 [ 570.890955] should_fail.cold+0x10a/0x149 [ 570.890966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 570.890978] should_failslab+0xd6/0x130 [ 571.682297] __kmalloc+0x2c1/0x400 [ 571.685827] ? rw_copy_check_uvector+0x226/0x2b0 [ 571.690595] rw_copy_check_uvector+0x226/0x2b0 [ 571.695171] import_iovec+0x94/0x360 [ 571.698897] ? dup_iter+0x240/0x240 [ 571.702534] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 571.707453] vfs_readv+0xa8/0x120 [ 571.710913] ? compat_rw_copy_check_uvector+0x320/0x320 [ 571.716272] ? lock_acquire+0x170/0x3f0 [ 571.720237] ? lock_downgrade+0x740/0x740 [ 571.724375] ? __fget+0x225/0x360 [ 571.727825] SyS_preadv+0x15a/0x200 [ 571.731446] ? SyS_writev+0x30/0x30 [ 571.735086] ? __do_page_fault+0x159/0xad0 [ 571.739327] ? SyS_writev+0x30/0x30 [ 571.742942] do_syscall_64+0x1d5/0x640 [ 571.746824] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 571.752019] RIP: 0033:0x466459 [ 571.755211] RSP: 002b:00007fc38644c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 571.762908] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 571.770211] RDX: 000000000000016b RSI: 00000000200017c0 RDI: 0000000000000004 14:59:18 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) preadv(r3, &(0x7f0000000240)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000080)}, {&(0x7f0000000200)=""/19, 0x13}], 0x3, 0x8000, 0x80000000) epoll_pwait(r2, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x2, &(0x7f0000000040)={[0x9b4]}, 0x8) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:59:18 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:18 executing program 0: epoll_create1(0x0) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000086fff4)) r3 = getpid() r4 = getpid() r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x3ff) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={r2, r5}) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mm_compaction_end\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000380)) rt_tgsigqueueinfo(r8, r9, 0xb, &(0x7f0000000240)={0x1f, 0x8001, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000100)='%\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x80000000}) [ 571.777487] RBP: 00007fc38644c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 571.784745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 571.792015] R13: 00007ffde689e67f R14: 00007fc38644c300 R15: 0000000000022000 [ 571.799286] CPU: 0 PID: 2396 Comm: syz-executor.1 Not tainted 4.14.231-syzkaller #0 [ 571.807091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.816441] Call Trace: [ 571.819056] dump_stack+0x1b2/0x281 [ 571.822684] should_fail.cold+0x10a/0x149 [ 571.826835] should_failslab+0xd6/0x130 [ 571.830810] kmem_cache_alloc+0x28e/0x3c0 [ 571.834957] __d_alloc+0x2a/0xa20 [ 571.838432] ? lock_downgrade+0x740/0x740 [ 571.842577] __shmem_file_setup.part.0+0xcb/0x3c0 [ 571.847414] ? shmem_create+0x30/0x30 [ 571.851221] ? __alloc_fd+0x1be/0x490 [ 571.855028] SyS_memfd_create+0x1fc/0x3c0 [ 571.859185] ? shmem_fcntl+0x120/0x120 [ 571.863072] ? __do_page_fault+0x159/0xad0 [ 571.867304] ? shmem_fcntl+0x120/0x120 [ 571.871219] do_syscall_64+0x1d5/0x640 [ 571.875141] entry_SYSCALL_64_after_hwframe+0x46/0xbb 14:59:19 executing program 5 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:59:19 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0xf502, 0x0) [ 571.880355] RIP: 0033:0x466459 [ 571.883537] RSP: 002b:00007fed527d5f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 571.891240] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000466459 [ 571.898541] RDX: 000000000000c000 RSI: 0000000000000000 RDI: 00000000004beba8 [ 571.907283] RBP: 0000000000000004 R08: 0000000000006000 R09: ffffffffffffffff [ 571.914551] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 571.921818] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020013c00 14:59:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d62c3b8a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x3f, 0x4, 0xc7, 0x696a4bc4, 0x11, "e9d9e9dddfd4ac722c0ca32475b67c38adb56c"}) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) syz_open_pts(r0, 0x113042) [ 571.933434] Bluetooth: hci1 command 0x0409 tx timeout 14:59:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$setown(r0, 0x8, 0x0) 14:59:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c734500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000000)) 14:59:20 executing program 3: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0xf502, 0x0) 14:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x47, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x564}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x4}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000000)={0xfffffffc, 0x7fff, 0x3, 0x0, 0x20, "c53ef8de555cf7225cdc1d66a1ab9b8bc6c0dd", 0x7, 0x56}) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:59:20 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:59:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000800)=""/4103, 0x1007}, {&(0x7f0000000300)=""/88, 0x58}], 0x2, 0x80002000, 0x4000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x4000, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)={0x4}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000180)="fc610db0eb03ff5c967ef9f21c3981423189506358fbc75f78de658bde7ddbfdd985370ed62c73ef50c1f7aa232e1b66bde7e7971f000800009cd47b4d386e394ac9a8e85618ee3f8d4b30b0f81e1198d9149f7206327e2f438798d6373f2f7f29c41de2c3b97f0c51729a6f2b1182b9802fce1817cf5caa4a5fa8ead048409342d0fe03e82b36318a44d2c710e2838e54e4ee0c8b826c368371a72be22a9e80dc2c398e8801deb35686afd3de6a17edbc2a6acc5b839f732a304e55085ce4af3c902d5b66ba85f6685ff9fb0c01bb4c22bec55b", 0xd4}, {&(0x7f0000000700)="21792d1a55949f30fdd2899a0570fa0914f9cb2c16ab9967594d1b1c1fa191daf128ec9d0e2ebc8d3b87949cdfec2bcc778e6d777710e2f74bedd71ed7863ef62caa3491c98c07707294569ce1df4f0db9bddf000687dcdb5d70148bc8be5c8ea861e6370aa7d96afb9bed9e1f8cd15f939b3618847de494d9ac29b98cfe028ffb62128e4dbe70acae2e114b7a45c1a0a62106ea84d80c1359cb587c9ddc204cff00adc8ebeeaacde413509ddcb3ff00000056f4fa6d00"/197, 0xc5}, {&(0x7f0000000400)="c83b7a0e2198c09dd090cff43f02e05ce2f842934e43d8cbfcb3045baa080017a9b29f185c888b6e224193c257336a24a73cf5d57efd58d4ff4247f26a4da4f50daff110ba913dda559ae85a53e42500b9321a34d576e283b7feb834c3d19b4b6af7071b204447c875587d6ed42883dfab07e2fdeb19b66d47af64040000006cc5f80699695da88c0a1888b5310a82c837d5703fa308", 0x96}, {&(0x7f0000000640)="850c190f218486704b4646e1ba0f43c34aa61332f6654a1c0b6d6d419ba8ae5a99817d23fd4b0919771f392e4dbcfef00912fd914d1b588d2b4b46bd9d1ba13b11d405aaf570c458aa4d7e24fd03a599fcd0c1b04cfc631bc202a0ccf88609e7e845e822db797d81e7cbea1522f7d73ad83f4b135ce9c8e2f9ec732d32319ab26f02d627", 0x84}, {&(0x7f0000000000)="e37ace69d37dc2028f1996c7152a14528a4421cb2ade410b9ef1594291b40000845027c5", 0x24}, {&(0x7f00000004c0)="9ba5fe462f1ea17f2f3adf7702f23e1f91be44a674dcc01aa971615eb35f74f7beaff08c4035a185f1d21acbe585383103f2e025d89c56e171dfb293d3fe411c7a03ac1f427ddfb4727782b03d0c3e155a94359b084f902022015073c732cdfd792a1f8b7c1419367d519c61f2df48135d5edf6a48a50ce78d36b9199c29cfd72f42f7796da8ef74da7791ef2f1b2699aa", 0x91}], 0x6, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 14:59:20 executing program 0: r0 = epoll_create1(0x80000) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() sched_setattr(r4, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x6, 0x8f, 0x4ff, 0x0, 0x100000000, 0x6, 0x2}, 0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00ce0edcd3a3be83c19a2cc7191d7035e489fe30b3edcc404da78d901fe990981b9e5dcc3fc739582c810530f7e3306e287114639d8c01b2c55e5c3980f5a6281da3a6d0b85df001f8f130c4545cfeed987a808a69e9f78986fcf8e79e84283d05fbead8fbbf8dbd049c68b9470c0c1f5e391d3ae5b129"]) 14:59:20 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80000) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x80002000}) 14:59:20 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r0, 0x8, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x64}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x35}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x60}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}]}, 0x50}, 0x1, 0x0, 0x0, 0x4040011}, 0x810) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r1, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:59:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0xffffd000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='limits\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=@RTM_NEWNSID={0x5c, 0x58, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@NETNSA_PID={0x8}, @NETNSA_PID={0x8}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x4}, @NETNSA_FD={0x8, 0x3, r0}, @NETNSA_PID={0x8, 0x2, r1}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8, 0x1, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x810}, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[@ANYBLOB="04"]) 14:59:20 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:59:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea132f2d92bea77beec8b2fdad222571fc9dc57905002dcb7582082a5da70fcd93a112752cc4a9b6ab187d6d4041c3a8542e649442699ff074ba82974c2ada4aa520b8e2d9b88ce11a1759e31697fadc8f05f1932b4c95c8b8310371679964e0a16fde647907246947dad4083507f934"], 0x8d) syz_open_pts(r0, 0x84000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000080)) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000040)=0x4608a0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400000, 0x4) 14:59:20 executing program 3: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0xf502, 0x0) 14:59:20 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") 14:59:20 executing program 1: rename(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 14:59:20 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000180)={0x90000000}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() r6 = syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="109cfca5f052c332fdb8b5775a693953d22595cf5b31492a4c4cb5a086c2c7b136d5046c17852ca03f58bf9535aef9e877129d72bb1505b2229f90caaae541e2f2a2f1300254", 0x46, 0x5}], 0x21080, &(0x7f0000000200)=ANY=[@ANYBLOB="757466081d3128727569daf706bfde36643c", @ANYRESDEC, @ANYBLOB=',permit_directio,defcontext=user_u,\x00']) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f0000000000)={r3, r6}) 14:59:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x828a800, &(0x7f0000000000)="60bc6e2b43dce5e653d65c08dd5e33b58629c442859da42941c17ea7f5935cc3167ce8472953ad850dd60be34d62c709783bf4817dd4", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)="2912") exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setregs(0xf, 0x0, 0x81, &(0x7f00000001c0)="d7a8a13391f6c592ce052ccaab78a73c2b1d0ee7fbba134dca3a585ceb6e55867a64f61cf2956f45cd19bdb5c084317a30e578642504f161db1e9ab780fefeb1b1c6e6114638e913f40a819a042a318f31f12cfc81d24ef96c222e5c651519379e4ec24c989cf2c0c610c7f54a5946b595eb42cb991f6e4d5d4bd0a8c555d60fda8ae4c24079afc3613777e055c5e036610e44fd726690a1d57cf4096303311fa8768bd44afc89e0ac4e7b9a90780b1172e3f102670d85e5ed9aa41c519d373caeec06a9cf19343e263f3e591711a4a740abc6e0d889ceba34c8ccf9a4f79246023781d2d48e2b6042cf41d2") r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f00000002c0)={0x7, 0x8, 0x18, "0cf14a4d1f02ae1ba4da695afae75eddaf93d016bd17add3ce22bb82d3af8bdcee8b9d541975047708e8ef2b86ba56dbf44c903af1d289a3799f6aee", 0x1, "8f023582018b0a8b8d316195f05007ec42728b4d88c650bfa5fd98d9d2788fb62e8cde5317f5bd680598b815263fb7631a1fe5fbf26714e877618886", 0x18}) preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 14:59:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6800) ioctl$KIOCSOUND(r1, 0x4b2f, 0x5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r0, r2) 14:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x3fe}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="00efdad71d6c1d89a4f93ecceb1617bc811d8dfa"]) clone(0x40000000, &(0x7f0000000280)="ed9fc799a27b819aab599a58e2fbb3074ea313dcbc9fad2763dded3217043476d11d45d6b5c8863abae1d8d128526416dd91e0a488fadb9b4ea05406c6413812523d278fc03451e936d2233653dd55bd0775b691902b1e950b56df848c2b3896eb3dffb32b97fe415bf0cf9737ce267fbd9ce6b2f11db12121f4dff9316be0df2d3a670bcaca9c8b1dfaf0c06c12eb06179c1026", &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)="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") r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x10000, 0x0) lsetxattr$security_capability(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)='security.capability\x00', &(0x7f00000014c0)=@v1={0x1000000, [{0x9, 0x1}]}, 0xc, 0x2) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x4, 0xf8, 0x5, 0x8, 0x0, 0x5, 0x28000, 0xe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80, 0x1, @perf_config_ext={0x10000, 0x99}, 0x402, 0x9, 0x7fffffff, 0x3, 0xfd9, 0x7fff, 0x8}, r0, 0xc, r1, 0x8) open(&(0x7f0000000040)='./file0\x00', 0x10202, 0x28) 14:59:20 executing program 0: epoll_create1(0x0) r0 = epoll_create1(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x1f, 0xf9, 0x1, 0x2, 0x0, 0x18c, 0x10c1, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0xfffffffffffffffa}, 0x0, 0x404, 0x3, 0x7, 0x6, 0x594a, 0x100}, r4, 0x7, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xce, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x48060}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) getgroups(0x1, &(0x7f0000000440)=[0xee01]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='v7\x00', 0x2002000, 0x0) r6 = openat$cgroup_int(r5, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r5, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 14:59:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r1, &(0x7f00000017c0), 0x16b, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 14:59:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a56aa0981f7658a09f7097900000000000000006c730500ad1853d258d19beafe82394e4848e1c7013580cec9ff7f00"/78], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) [ 572.425642] IPVS: ftp: loaded support on port[0] = 21 14:59:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:59:20 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) [ 572.472687] new mount options do not match the existing superblock, will be ignored [ 572.544289] new mount options do not match the existing superblock, will be ignored [ 572.611884] IPVS: ftp: loaded support on port[0] = 21 14:59:20 executing program 3: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") r6 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0xf502, 0x0) 14:59:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x20, 0x6, 0x40, 0x0, 0xffffffffffff8000, 0x800, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_config_ext={0x8, 0x6}, 0x550, 0x400, 0x1, 0x4, 0x6, 0x100, 0x2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) 14:59:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) ioctl$CHAR_RAW_GETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000000)) 14:59:20 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) epoll_wait(r2, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x5) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:59:20 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') 14:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x40040, 0x208) 14:59:20 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) r6 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x154, 0x0, 0x201, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xe9d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd6b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc92}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'xfrm0\x00'}}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffff}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x20000000}, 0x40414) 14:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1d8580, 0x0) getdents64(r0, &(0x7f0000000280)=""/174, 0xae) 14:59:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015343e4848e1c7014243800000f3e86d53707eda172d9a6ed375c8c90000000000ea13237bde9a9eb96fb6f2cf42a488b7a7740b87511ce454374d1def2acde9481378bef25d3dd4d9a455308c209617d21a843d4578554912bc89aec54f248f36402c082d8869bcc6a074cefdb0592542b5a8741d57b3f684d394c86c15881c63f71f612d0407604e0b34adefb8256a9df510913700"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="15e90bbdef622e5d24d8bbcc66a0f512219299a7b5d850350e5124a8c1b8783a2dd7ba7bb1ad6821314e34a66eb43f55ef5ad4deea355a742582bfa40395e63a22105529de82ddfa65de04309a45e91e02ecbf8ae7244d7c010000002fb6984c7dbb"]) open(&(0x7f0000000040)='./file0/file0\x00', 0x1, 0x100) 14:59:20 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) 14:59:20 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) r4 = dup(r3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000000)={0xa0000000}) r5 = getpid() kcmp$KCMP_EPOLL_TFD(r5, 0x0, 0x7, r0, &(0x7f00000000c0)={r3, r2}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_setscheduler(r6, 0x1, &(0x7f0000000100)=0x2) 14:59:20 executing program 3: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)=ANY=[@ANYBLOB]) 14:59:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000280)={@rand_addr, @initdev, 0x0}, &(0x7f00000002c0)=0xc) clone(0x82000000, &(0x7f0000000480)="e38beb292680fa571607a8531d48b1fa3e5e0c8865c1a27360923886e6185d81b9211270470cadd724a09aeadee301d21a761543bd1f74f0dbddec45cc495564dae1d16716e17a3a6fd5205a7d22d1e94a69133e7020fc988cf2c4d3a014e4f4999a280bf8d83029e5ae9ed81bb8ab9b7530aefd7d6ef7ecacfe14f39f91231c1b39e0b41f41b423d01bc4ca7000c241d679bc79c91c81cbc3d41f584db72dbd49c7908a6b6c944c93548d02d6d21cb93d8679449f3ec45c42ae8a52a7ced9ba249d390c2f26ef68896aa551", &(0x7f0000000240), &(0x7f0000000580), &(0x7f00000005c0)="61303b88c363ec7aa95a3134539fc8d65c2ec231ac90da95e80fd3a617091653c47ba3b0836a507e453125b03c295cd5dccd22ae83fc40a53a9ed5fd745ac674e122e224e97108c58a11af8719a115f07cc38b27503331b6caafba7f0d7131889e925a5d41bc3a2cbd299053d776d3412303f7a2ae46421daec756c4dd0b7e76ac37c86d1b82cb2a521ea3d161f394414c9afdd6f52f08e2c909695f3ea0a1b1c7a43eb180adb9c4b9999cd64bf5b40847ce40bbb0d3") sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="44000000180000042abd7000fbdbdf2502000002fc03c807003b000008000400", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000500e000000208000b000900000008000200e0000001"], 0x44}, 0x1, 0x0, 0x0, 0x8010}, 0x40001) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r1, &(0x7f00000017c0), 0x16b, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='ns\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x1, 0xfb, 0x5, 0x2d, 0x0, 0x7fffffff, 0x84c2, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x6aa3cdb3b6503746, 0xd54e062, 0x8000, 0x6, 0x2, 0x1f, 0x7f}, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) accept(r2, &(0x7f0000000080)=@ipx, &(0x7f0000000000)=0x80) fcntl$setown(r2, 0x8, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 14:59:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYRES32], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:59:20 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r6 = getpid() r7 = getpid() r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x24, r9, 0x701, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r9, 0x4, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r10}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x31}]}, 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x10) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r0, &(0x7f00000000c0)={r4, r3}) 14:59:20 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) 14:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000013c00)) 14:59:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppoe, &(0x7f00000000c0)=0x80) 14:59:21 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) 14:59:21 executing program 1: ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000280)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000680)={{}, 0x0, 0xe, @unused=[0x100000001, 0x3, 0x1], @devid=r0}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='@]!@-[-$\x00') 14:59:21 executing program 1: write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0x7) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf7005e6876c78201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x5}, 0x8) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x1000, 0x22) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x13) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)={0x80002008}) ioctl$TCSBRK(r2, 0x5409, 0x7f) 14:59:21 executing program 3: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) clone(0x100, &(0x7f0000000180)="3fe5083b473ffe3c2fcc0622d3f15b9f8b2eba108a17e1a3f56301eedb4773acc499f0913a3b5042e4188f4c8b36ee7b1974579afa850f6cc2a124e758745762641c56583e5cf61e61dfde9895b011c6eaf23480e7812bfbd8d337a51c875456f135e5f1f67ee2572860ebf8310f3a8072fe499b00538c8b4cebccec422b5e831b75a6e25e24fc726cf72c5419dc035cc43c78243bc27109b9abd6e2c0cd7d61f1d91ac5b43148a04636a7ee5024994c96", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="a9e77c8efcf8880b4c289f5d3707a484cd3810dd3806838205ebe72d267bba1a") 14:59:21 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) poll(&(0x7f0000000000)=[{r1, 0x1}, {r6, 0x2040}, {r2, 0x54bc}, {r1, 0x20}, {r2, 0x40}, {r7, 0x222}], 0x6, 0x8) 14:59:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800003c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 14:59:21 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) 14:59:21 executing program 1: setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040)={{0x2f, @multicast1, 0x4e23, 0x2, 'rr\x00', 0x20, 0xb67f, 0x6f}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x0, 0x4, 0x95, 0x8}}, 0x44) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000013c00)) 14:59:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18b26a85dbec7bf700e100b9068201c7d2db868a52aa0981f7658a09f709793817d0b6bb0015346c730500ad1853d258d19beafe82393e4848e1c7013542438000000000000000ea13"], 0x8d) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000000)="6b53bf8b241a02092bf15f901b0f54a86a385673f92198fdf22e04ea376f2d80a2364cc7628d4b067555cb0e01088b538c36df020d6e5c1e8720d0d310558f84065e29b5a5365744d1953bcb4f87107e30789a8a19bf3d17a22d7789b61aa53f2b6feac560f1b6f301b63514cb5436bd76e53e267d5ef9767bbbff0608bc774d6a3289e8ccdf398b46dae6793c62d432a29e90bdf1239a3b96eb3567197b7f8f44c1f106725be7cabf8b8dec57fdb21973ade2ab3e30363635a8ba20dac92fb0c1de342e574e50f19259e25a1f") ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:59:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x9}, {&(0x7f0000010200)="01000000000005000c", 0x4a, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000280)="504d4d00504d4b5f568468d909a8a61dec28e83f5ee6fb0deb5f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000e6ffffff0000000070333400ca782f746573c0c576247923351f8505ad9ea1c65936784f3f663cf96f275d03e1a85b9a7c35b97778f4871030f9f8ecb96ecc200ce89e9ab77e757c44713bc8fdd2c96f6db0dc6afb969d5fc9ac675b90f3d2306384f78066c530d865e56268a4349698a8ef489484128db81e1135095cd0ae84714fa59e83a57ef1a674", 0x71, 0x6000}], 0x888012, &(0x7f0000000040)={[], [{@euid_lt={'euid<', 0xee01}}, {@audit='audit'}, {@appraise='appraise'}, {@smackfsroot={'smackfsroot', 0x3d, 'audit'}}, {@smackfsdef={'smackfsdef', 0x3d, ')%.'}}]}) 14:59:21 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x1, 0x4, 0x5, 0x6d, 0x1, 0x400, 0x2, 0x6, 0x1000}, 0x0) 14:59:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x8d) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000040)={0xa, 0xffffff73, [], 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$SNDCTL_DSP_SYNC(r1, 0x5001, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r1, 0x8004500f, &(0x7f00000000c0)) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) 14:59:21 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) 14:59:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff7}, 0x8, 0x0, 0x7, 0x8, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 14:59:21 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_create1(0x80000) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() r6 = dup2(r0, r1) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20071026, r8}, &(0x7f00000001c0)={0x3ff, 0x400, 0x6, 0x4, 0x3, 0xffffffff}) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r9, 0x0) read$eventfd(r9, &(0x7f0000000040), 0x8) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000000)={0x10}) fcntl$setown(r3, 0x8, r5) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:59:21 executing program 3: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, r4, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000340)="c3f249162b5df97294864b689633e6a61ab1e4292dad723bf1a08b5b1c6781561351d7f40c715cff7a7354237546ebae07bbd044b6ce05d30b1410bf956ce5daac43463c312c577e6364870d19f87f33325c34602fa28c713af4b1f6e683145b1e3b0a7360b2dc6b1aa32282d78be3bfcdff7ca079fc2b0a746c36c4d1af9588b5caacedaa15b43a8941796e776b", 0x8e}, {&(0x7f0000000400)="dbf9854aaf4118cc275d5266edd33d5dda890966abc5f3e1f4bb788f6aec007b5847a8527c4f1bb4935351b3d9ebfd80ecba77594796a27ce0f8a47d899ab41cdf154ab9a49b9701aac5ae66f209b5231badd7dae22db9f44086a25d904fbb3ba13fafbcbfae4c8a7c03dff973214da859bec2be0d15d8eeaa971ab75ce9b2ee4c635f17ff5fbdae2db789cee615d108805f1b4600ced682c12043e815fb7e761214fb50c99bd1a441c75bb1e74291d30f14ad34743bc0df49257a20583fd83e84fe1b950e29f8", 0xc7}, {&(0x7f0000000500)="af5391f88a7dc676909a9d716b137175d3632fc90f1fb025d0836a6d9d5623a5129e9022dac961b7", 0x28}, {&(0x7f0000000540)="7c1b919260a0753ca6b27de18270a1cb0d29e34260ce060a5e053fb7ce35f07cd67115bdc1b585359a3343f2890ecf3fae9de4337180e182ffa15e26ced6770d3c7598b5d5e5d2d4f8bac6bbf95549cfe0ce5894bd185e4f0917c2cf55f10581a491d902111ec5b8afec22dcfef6892bfb74eec54c9d6be27e5bbed1d98e8a501b91cc8d115a1b15c6a7677c817b05d82212ba698fa555e220f71ec237e9a59d7b668109a6dbd28b1f05ef13d66f36995ac1f2dd6f48c6a84b32b40b30ef1f020a2e630aac12", 0xc6}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x37}, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0x62, 0x1, 0xe, [{@remote, 0x7965b0c9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffd}, {@loopback, 0x6}, {@local, 0x101}, {@multicast1}, {@broadcast}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}], 0xd0}, 0x4008401) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r5, &(0x7f00000017c0), 0x16b, 0x0, 0x0) 14:59:21 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000140)="504d4d00504d4b5f568468d909a8a61decf3841a4dffd8f4655f00810000000000000074962a5bb598f9ae199a60d1af476258313a514e7e66010079756b6f762d676c6170746f703000000000000000000000000000000000000000000000000000000000000070333400ca782f746573", 0x71, 0x6000}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) 14:59:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, "078ff0251c0e0003"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x8) 14:59:21 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="b400000000c08800791066518cc7c73a4f69014c000000000060000900000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = signalfd(r0, &(0x7f0000000280), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0xc4, 0x100}}}}}}]}, 0x48}}, 0x0) 14:59:21 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/110, 0x6e}], 0x1, 0x400, 0x2000) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f00000000c0)={r3, r2}) 14:59:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) preadv(0xffffffffffffffff, &(0x7f0000002640)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000000080)="7e24bf93425190c02eb1565c28c4b9e4e14ca047469cc5c9cc8acc27bf48379588952b8374c3c9c306d0a641e725906ed607bd9a552d94a81db3db114977f9ed90dac04feb6564b1938076aaee0961d55d49687299d3d3a63cec825b32f34dd400be78698f9a1b50f081bcc059c2c437eb4a5e57d15a5ea4787fd81d", &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0)="5f2fa0af976275b67f510aafb055e4f9c25204b682601fb3fba4eeda82fd795c47fb53c86184429252fe97ee153069542ce2a13c274c51e6adf56fc87a740924070867b826044aac1051874b577b7f595dacad4bf479c93d08fc0aac97f67144236cb145f354