02000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:48:24 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:48:24 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x2) [ 1422.881337] loop4: detected capacity change from 0 to 21 [ 1422.889252] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1422.902021] loop4: detected capacity change from 0 to 21 [ 1422.902974] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:48:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa7e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:48:24 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:48:24 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:48:24 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x3) [ 1423.006416] loop4: detected capacity change from 0 to 21 [ 1423.030653] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:48:24 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:48:38 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:48:38 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x89060000}}], 0x2, 0x0) 06:48:38 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:48:38 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x4) 06:48:38 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) 06:48:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa80, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:48:38 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="020ebddb423b"], 0x13, 0x0) 06:48:38 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x5) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:48:38 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="030ebddb423b"], 0x13, 0x0) [ 1436.611996] loop4: detected capacity change from 0 to 21 [ 1436.615061] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1436.637645] loop4: detected capacity change from 0 to 21 [ 1436.640203] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:48:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:48:38 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="0f0ebddb423b"], 0x13, 0x0) 06:48:38 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1436.724199] loop4: detected capacity change from 0 to 21 [ 1436.729319] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1437.231944] loop4: detected capacity change from 0 to 21 [ 1437.243706] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:48:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:48:51 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:48:51 executing program 2: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:48:51 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="100ebddb423b"], 0x13, 0x0) 06:48:51 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x5) 06:48:51 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:48:51 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x892f0000}}], 0x2, 0x0) 06:48:51 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) 06:48:51 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040fbddb423b"], 0x13, 0x0) [ 1449.966846] loop4: detected capacity change from 0 to 21 [ 1450.146411] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:49:05 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb42fd"], 0x13, 0x0) 06:49:05 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xdc050000}}], 0x2, 0x0) 06:49:05 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xf) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:05 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x6) 06:49:05 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 06:49:05 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) 06:49:05 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb40, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1464.353276] loop4: detected capacity change from 0 to 21 06:49:06 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x1fd, 0x0) [ 1464.366192] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1464.375377] loop4: detected capacity change from 0 to 21 [ 1464.386395] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:49:06 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x8) 06:49:06 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb80, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:49:06 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xe0050000}}], 0x2, 0x0) 06:49:06 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x2) 06:49:06 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xf) [ 1464.533925] loop4: detected capacity change from 0 to 21 [ 1464.541450] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:49:06 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1464.553795] loop4: detected capacity change from 0 to 21 [ 1464.563481] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:49:06 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xfb) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:06 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x10) 06:49:06 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x4) 06:49:06 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 06:49:06 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x8) 06:49:18 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) 06:49:18 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:18 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xeffdffff}}], 0x2, 0x0) 06:49:18 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x28) 06:49:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:49:18 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x10) 06:49:18 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1cb) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:18 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1476.524200] loop4: detected capacity change from 0 to 21 [ 1476.550176] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:49:18 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x14) 06:49:18 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x2e) 06:49:18 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xc0) 06:49:18 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1fd) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:18 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xf0) [ 1477.174841] loop4: detected capacity change from 0 to 21 [ 1477.181376] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:49:18 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x321) 06:49:19 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x1400) 06:49:19 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) 06:49:19 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x2000) [ 1477.919320] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 06:49:32 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x700) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:32 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xe0) 06:49:32 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) (fail_nth: 1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:32 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:32 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xffffa888}}], 0x2, 0x0) 06:49:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:49:32 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 06:49:32 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x2103) [ 1490.878694] loop4: detected capacity change from 0 to 21 [ 1490.881375] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1490.895725] loop4: detected capacity change from 0 to 21 [ 1490.900061] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1490.923394] FAULT_INJECTION: forcing a failure. [ 1490.923394] name failslab, interval 1, probability 0, space 0, times 0 06:49:32 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xf000) [ 1490.924348] CPU: 0 PID: 8907 Comm: syz-executor.2 Not tainted 6.4.0-next-20230703 #1 [ 1490.925063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1490.925630] Call Trace: [ 1490.925818] [ 1490.925984] dump_stack_lvl+0xc1/0xf0 [ 1490.926281] should_fail_ex+0x4b4/0x5b0 [ 1490.926577] ? getname_flags.part.0+0x50/0x4f0 [ 1490.926922] should_failslab+0x9/0x20 [ 1490.927209] kmem_cache_alloc+0x62/0x370 [ 1490.927522] getname_flags.part.0+0x50/0x4f0 [ 1490.927852] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1490.928292] getname_flags+0x9e/0xf0 [ 1490.928580] user_path_at_empty+0x2f/0x70 [ 1490.928891] path_setxattr+0x92/0x1d0 [ 1490.929180] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1490.929560] ? __pfx_path_setxattr+0x10/0x10 [ 1490.929893] __x64_sys_setxattr+0xc4/0x160 [ 1490.930210] ? syscall_enter_from_user_mode+0x21/0x50 [ 1490.930626] do_syscall_64+0x3f/0x90 [ 1490.930905] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1490.931281] RIP: 0033:0x7f1b2578bb19 [ 1490.931550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1490.932815] RSP: 002b:00007f1b22d01188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1490.933367] RAX: ffffffffffffffda RBX: 00007f1b2589ef60 RCX: 00007f1b2578bb19 [ 1490.933877] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1490.934391] RBP: 00007f1b22d011d0 R08: 0000000000000001 R09: 0000000000000000 [ 1490.934898] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1490.935417] R13: 00007ffd815c602f R14: 00007f1b22d01300 R15: 0000000000022000 [ 1490.935937] 06:49:32 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xffffca88}}], 0x2, 0x0) 06:49:32 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xff01) 06:49:32 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) (fail_nth: 2) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:32 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:32 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) (fail_nth: 3) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:32 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xe5e) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd1, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1491.231940] FAULT_INJECTION: forcing a failure. [ 1491.231940] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1491.232993] CPU: 0 PID: 8938 Comm: syz-executor.2 Not tainted 6.4.0-next-20230703 #1 [ 1491.233552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1491.234132] Call Trace: [ 1491.234330] [ 1491.234504] dump_stack_lvl+0xc1/0xf0 [ 1491.234802] should_fail_ex+0x4b4/0x5b0 [ 1491.235103] strncpy_from_user+0x38/0x340 [ 1491.235418] getname_flags.part.0+0x95/0x4f0 [ 1491.235759] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1491.236194] getname_flags+0x9e/0xf0 [ 1491.236481] user_path_at_empty+0x2f/0x70 [ 1491.236796] path_setxattr+0x92/0x1d0 [ 1491.237083] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1491.237478] ? __pfx_path_setxattr+0x10/0x10 [ 1491.237818] __x64_sys_setxattr+0xc4/0x160 [ 1491.238131] ? syscall_enter_from_user_mode+0x21/0x50 [ 1491.238521] do_syscall_64+0x3f/0x90 [ 1491.238810] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1491.239196] RIP: 0033:0x7f1b2578bb19 [ 1491.239471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1491.240754] RSP: 002b:00007f1b22d01188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1491.241298] RAX: ffffffffffffffda RBX: 00007f1b2589ef60 RCX: 00007f1b2578bb19 [ 1491.241808] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1491.242336] RBP: 00007f1b22d011d0 R08: 0000000000000001 R09: 0000000000000000 [ 1491.242848] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1491.243358] R13: 00007ffd815c602f R14: 00007f1b22d01300 R15: 0000000000022000 [ 1491.243883] 06:49:32 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:32 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xf0) 06:49:32 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xa800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:32 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) (fail_nth: 4) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1491.435381] loop4: detected capacity change from 0 to 21 [ 1491.437118] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1491.441245] FAULT_INJECTION: forcing a failure. [ 1491.441245] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1491.442209] CPU: 0 PID: 8949 Comm: syz-executor.2 Not tainted 6.4.0-next-20230703 #1 [ 1491.442779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1491.443364] Call Trace: [ 1491.443556] [ 1491.443726] dump_stack_lvl+0xc1/0xf0 [ 1491.444024] should_fail_ex+0x4b4/0x5b0 [ 1491.444322] strncpy_from_user+0x38/0x340 [ 1491.444637] setxattr_copy+0x86/0x200 [ 1491.444931] setxattr+0xcb/0x170 [ 1491.445189] ? __pfx_setxattr+0x10/0x10 [ 1491.445493] ? lock_acquire+0x19a/0x4c0 [ 1491.445796] ? find_held_lock+0x2c/0x110 [ 1491.446111] ? __mnt_want_write+0x3c/0x2e0 [ 1491.446444] ? lock_release+0x1e3/0x680 [ 1491.446742] ? __pfx_lock_release+0x10/0x10 [ 1491.447062] ? __pfx_lock_acquire+0x10/0x10 [ 1491.447383] ? kasan_quarantine_put+0x81/0x1d0 [ 1491.447732] ? __mnt_want_write+0x1f4/0x2e0 [ 1491.448060] path_setxattr+0x19b/0x1d0 [ 1491.448360] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1491.448755] ? __pfx_path_setxattr+0x10/0x10 [ 1491.449103] __x64_sys_setxattr+0xc4/0x160 [ 1491.449423] ? syscall_enter_from_user_mode+0x21/0x50 [ 1491.449817] do_syscall_64+0x3f/0x90 [ 1491.450104] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1491.450499] RIP: 0033:0x7f1b2578bb19 [ 1491.450778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1491.452059] RSP: 002b:00007f1b22d01188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1491.452602] RAX: ffffffffffffffda RBX: 00007f1b2589ef60 RCX: 00007f1b2578bb19 [ 1491.453110] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1491.453620] RBP: 00007f1b22d011d0 R08: 0000000000000001 R09: 0000000000000000 [ 1491.454135] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1491.454657] R13: 00007ffd815c602f R14: 00007f1b22d01300 R15: 0000000000022000 [ 1491.455180] 06:49:33 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:33 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) (fail_nth: 5) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1491.587074] FAULT_INJECTION: forcing a failure. [ 1491.587074] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.588085] CPU: 0 PID: 8957 Comm: syz-executor.2 Not tainted 6.4.0-next-20230703 #1 [ 1491.588642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1491.589230] Call Trace: [ 1491.589426] [ 1491.589599] dump_stack_lvl+0xc1/0xf0 [ 1491.589896] should_fail_ex+0x4b4/0x5b0 [ 1491.590198] ? kvmalloc_node+0xaa/0x200 [ 1491.590514] should_failslab+0x9/0x20 [ 1491.590801] __kmem_cache_alloc_node+0x66/0x320 [ 1491.591153] ? kvmalloc_node+0xaa/0x200 [ 1491.591458] ? kvmalloc_node+0xaa/0x200 [ 1491.591761] __kmalloc_node+0x4d/0x160 [ 1491.592055] kvmalloc_node+0xaa/0x200 [ 1491.592356] vmemdup_user+0x26/0x110 [ 1491.592644] setxattr_copy+0x144/0x200 [ 1491.592943] setxattr+0xcb/0x170 [ 1491.593208] ? __pfx_setxattr+0x10/0x10 [ 1491.593516] ? lock_acquire+0x19a/0x4c0 [ 1491.593816] ? find_held_lock+0x2c/0x110 [ 1491.594124] ? __mnt_want_write+0x3c/0x2e0 [ 1491.594459] ? lock_release+0x1e3/0x680 [ 1491.594760] ? __pfx_lock_release+0x10/0x10 [ 1491.595081] ? __pfx_lock_acquire+0x10/0x10 [ 1491.595401] ? kasan_quarantine_put+0x81/0x1d0 [ 1491.595759] ? __mnt_want_write+0x1f4/0x2e0 [ 1491.596088] path_setxattr+0x19b/0x1d0 [ 1491.596383] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1491.596778] ? __pfx_path_setxattr+0x10/0x10 [ 1491.597116] __x64_sys_setxattr+0xc4/0x160 [ 1491.597429] ? syscall_enter_from_user_mode+0x21/0x50 [ 1491.597808] do_syscall_64+0x3f/0x90 [ 1491.598094] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1491.598487] RIP: 0033:0x7f1b2578bb19 [ 1491.598759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1491.600057] RSP: 002b:00007f1b22d01188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1491.600600] RAX: ffffffffffffffda RBX: 00007f1b2589ef60 RCX: 00007f1b2578bb19 [ 1491.601107] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1491.601616] RBP: 00007f1b22d011d0 R08: 0000000000000001 R09: 0000000000000000 [ 1491.602131] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1491.602652] R13: 00007ffd815c602f R14: 00007f1b22d01300 R15: 0000000000022000 [ 1491.603179] [ 1491.779956] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1491.782065] loop4: detected capacity change from 0 to 21 [ 1491.787236] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:49:33 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 06:49:33 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x80000) 06:49:33 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) (fail_nth: 6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1492.018479] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 06:49:46 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xffffdd86}}], 0x2, 0x0) 06:49:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:49:46 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xf8) 06:49:46 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:46 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:46 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) (fail_nth: 7) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:49:46 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x200000) 06:49:46 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xfd01) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1505.118811] loop4: detected capacity change from 0 to 21 [ 1505.129241] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:49:46 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1505.141978] loop4: detected capacity change from 0 to 21 [ 1505.143284] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1505.969491] FAULT_INJECTION: forcing a failure. [ 1505.969491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1505.970346] CPU: 1 PID: 9001 Comm: syz-executor.2 Not tainted 6.4.0-next-20230703 #1 [ 1505.970860] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1505.971352] Call Trace: [ 1505.971517] [ 1505.971665] dump_stack_lvl+0xc1/0xf0 [ 1505.971923] should_fail_ex+0x4b4/0x5b0 [ 1505.972184] strncpy_from_user+0x38/0x340 [ 1505.972453] setxattr_copy+0x86/0x200 [ 1505.972704] setxattr+0xcb/0x170 [ 1505.972935] ? __pfx_setxattr+0x10/0x10 [ 1505.973202] ? lock_acquire+0x19a/0x4c0 [ 1505.973461] ? find_held_lock+0x2c/0x110 [ 1505.973728] ? __mnt_want_write+0x3c/0x2e0 [ 1505.974038] ? lock_release+0x1e3/0x680 [ 1505.974298] ? __pfx_lock_release+0x10/0x10 [ 1505.974579] ? __pfx_lock_acquire+0x10/0x10 [ 1505.974853] ? kasan_quarantine_put+0x81/0x1d0 [ 1505.975154] ? __mnt_want_write+0x1f4/0x2e0 [ 1505.975435] path_setxattr+0x19b/0x1d0 [ 1505.975688] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1505.976058] ? __pfx_path_setxattr+0x10/0x10 [ 1505.976349] ? __pfx_ksys_write+0x10/0x10 [ 1505.976616] __x64_sys_setxattr+0xc4/0x160 [ 1505.976919] ? syscall_enter_from_user_mode+0x21/0x50 [ 1505.977251] do_syscall_64+0x3f/0x90 [ 1505.977497] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1505.977837] RIP: 0033:0x7f1b2578bb19 [ 1505.978074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1505.979153] RSP: 002b:00007f1b22ce0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1505.979617] RAX: ffffffffffffffda RBX: 00007f1b2589f020 RCX: 00007f1b2578bb19 [ 1505.980047] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1505.980476] RBP: 00007f1b22ce01d0 R08: 0000000000000001 R09: 0000000000000000 [ 1505.980904] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1505.981332] R13: 00007ffd815c602f R14: 00007f1b22ce0300 R15: 0000000000022000 [ 1505.981774] 06:50:00 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xfffff788}}], 0x2, 0x0) 06:50:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:50:00 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x80000) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:00 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:00 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xfc) 06:50:00 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:00 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xf0ffff) 06:50:00 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1518.904074] loop4: detected capacity change from 0 to 21 [ 1518.906949] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1518.938500] loop4: detected capacity change from 0 to 21 [ 1518.939754] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:50:13 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xfffffb88}}], 0x2, 0x0) 06:50:13 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1fd, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:13 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:13 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x1000000) 06:50:13 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1cc) 06:50:13 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:50:13 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1531.751596] loop4: detected capacity change from 0 to 21 [ 1531.761593] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1531.768730] loop4: detected capacity change from 0 to 21 [ 1531.775558] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:50:13 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x2000000) 06:50:13 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x4000000) 06:50:13 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1fd) 06:50:13 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:13 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xfffffdef}}], 0x2, 0x0) 06:50:13 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x10000000) 06:50:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:50:13 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x700) 06:50:13 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1532.267338] loop4: detected capacity change from 0 to 21 [ 1532.269032] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1532.523470] loop4: detected capacity change from 0 to 21 [ 1532.531525] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1532.605229] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 06:50:26 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xd34) 06:50:26 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:26 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xffffff7f}}], 0x2, 0x0) 06:50:26 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:26 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:26 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x2f89}}, './file0\x00'}) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000200)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:26 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x14000000) 06:50:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1544.832008] loop4: detected capacity change from 0 to 21 [ 1544.842683] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) [ 1544.870829] loop4: detected capacity change from 0 to 21 [ 1544.897355] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:50:26 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xe60) 06:50:26 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x21030000) 06:50:26 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:26 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x4000000000000}}], 0x2, 0x0) 06:50:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe9, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:50:26 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x8bffffff) 06:50:26 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:26 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:26 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xa800) [ 1545.127570] loop4: detected capacity change from 0 to 21 06:50:26 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1545.149066] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:50:26 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x8cffffff) [ 1545.195047] loop4: detected capacity change from 0 to 21 [ 1545.207234] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (10 blocks) 06:50:40 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:40 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:40 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xe4ffffff) 06:50:40 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:40 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xfd01) 06:50:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:50:40 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x8000000000000}}], 0x2, 0x0) 06:50:40 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1f, 0xc0, 0x0, 0x1a, 0x0, 0xfffffffffffffff8, 0x40, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x98, 0x4}, 0x13, 0x4b1, 0xf, 0x0, 0x2, 0x7, 0xc, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x9, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1559.345014] loop4: detected capacity change from 0 to 256 [ 1559.447050] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (128 blocks) 06:50:41 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x80000) 06:50:41 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xf6ffffff) 06:50:41 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="414f5907a2cbd4ba4d8273797a30"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000300)=ANY=[@ANYRESDEC=r0], 0x13, 0x0) [ 1559.691327] perf: interrupt took too long (2541 > 2500), lowering kernel.perf_event_max_sample_rate to 78000 [ 1559.725585] loop4: detected capacity change from 0 to 256 [ 1559.746399] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (128 blocks) 06:50:41 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xfd01) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:41 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xfbffffff) 06:50:41 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x40030000000000}}], 0x2, 0x0) 06:50:41 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:50:41 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)=ANY=[@ANYBLOB="8d8573a7d472c27b123a3ba137442956fad11db28a373a2b0b578cfba073426ae4d3b5e8df746cfaf26ce84a26e03484299fe66fc042e9b76b80bf2022ada6abc358"], 0x13, 0x1) [ 1559.978994] loop4: detected capacity change from 0 to 384 [ 1559.998272] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (192 blocks) [ 1560.009751] loop4: detected capacity change from 0 to 384 [ 1560.015522] EXT4-fs (loop4): bad geometry: block count 256 exceeds size of device (192 blocks) 06:50:41 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x5) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:41 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xfeffffff) 06:50:41 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x100000000000000}}], 0x2, 0x0) 06:50:41 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:50:41 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) fcntl$getown(r0, 0x9) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan1\x00'}) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000040), &(0x7f00000001c0)=ANY=[@ANYRESHEX=r0, @ANYRES64=r1], 0x13, 0x1) 06:50:41 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xff010000) 06:50:41 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x84000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, r3, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000440)=ANY=[@ANYBLOB="a550c448043914f65de467bec82829559dbede432c473952b745c7caac8aa04c475371258740b8f47a381898da1d4b07bd4e88fb43f056ee664a7629f626507f87d1945601bdc2c40799fbfb3268cfafc08c175f"], 0x13, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll, 0x80, 0x0}}], 0x2, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r4, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r6}, 0x80, 0x0}}], 0x2, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000600)={0x270, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x254, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x80, 0x7f, 0x5, 0x81}, {0x2, 0xc7, 0x8, 0x4705}, {0x1, 0x0, 0xff, 0x9}, {0x8c, 0xfd, 0x1, 0x3}, {0x1, 0x2, 0x5, 0x1}, {0x8, 0xed, 0x0, 0xc52}, {0x9, 0x4, 0xff, 0x2}]}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}]}}]}, 0x270}, 0x1, 0x0, 0x0, 0x2000804c}, 0x4004) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1560.246978] loop4: detected capacity change from 0 to 512 06:50:41 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x400000000000000}}], 0x2, 0x0) [ 1560.281498] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1560.287120] EXT4-fs (loop4): get root inode failed [ 1560.288915] EXT4-fs (loop4): mount failed 06:50:41 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1560.325332] loop4: detected capacity change from 0 to 512 [ 1560.371336] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1560.373901] EXT4-fs (loop4): get root inode failed [ 1560.374715] EXT4-fs (loop4): mount failed 06:50:54 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 1) 06:50:54 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:54 executing program 1: prctl$PR_PAC_RESET_KEYS(0x36, 0x9) pipe2(0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20000014) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:50:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:50:54 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x3) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x580c2}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:54 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x800000000000000}}], 0x2, 0x0) 06:50:54 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xfffff000) 06:50:54 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1573.042864] loop4: detected capacity change from 0 to 512 [ 1573.058071] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1573.059469] EXT4-fs (loop4): get root inode failed [ 1573.059825] EXT4-fs (loop4): mount failed [ 1573.074746] loop4: detected capacity change from 0 to 512 06:50:54 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xffffff8b) [ 1573.087465] FAULT_INJECTION: forcing a failure. [ 1573.087465] name failslab, interval 1, probability 0, space 0, times 0 [ 1573.090238] CPU: 1 PID: 9261 Comm: syz-executor.6 Not tainted 6.4.0-next-20230703 #1 [ 1573.091194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1573.092210] Call Trace: [ 1573.092548] [ 1573.092842] dump_stack_lvl+0xc1/0xf0 [ 1573.093362] should_fail_ex+0x4b4/0x5b0 [ 1573.093877] ? getname_flags.part.0+0x50/0x4f0 [ 1573.094467] should_failslab+0x9/0x20 [ 1573.094956] kmem_cache_alloc+0x62/0x370 [ 1573.095534] ? vfs_write+0x155/0xda0 [ 1573.096025] getname_flags.part.0+0x50/0x4f0 [ 1573.096610] getname_flags+0x9e/0xf0 [ 1573.097121] user_path_at_empty+0x2f/0x70 [ 1573.097681] path_setxattr+0x92/0x1d0 [ 1573.098192] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1573.098954] ? __pfx_path_setxattr+0x10/0x10 [ 1573.099550] ? ksys_write+0x19e/0x250 [ 1573.100055] ? __pfx_ksys_write+0x10/0x10 [ 1573.100608] __x64_sys_setxattr+0xc4/0x160 [ 1573.101160] ? syscall_enter_from_user_mode+0x21/0x50 [ 1573.101829] do_syscall_64+0x3f/0x90 [ 1573.102332] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1573.103008] RIP: 0033:0x7f1f9533fb19 [ 1573.103506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1573.105734] RSP: 002b:00007f1f928b5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1573.106685] RAX: ffffffffffffffda RBX: 00007f1f95452f60 RCX: 00007f1f9533fb19 [ 1573.107605] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1573.108490] RBP: 00007f1f928b51d0 R08: 0000000000000001 R09: 0000000000000000 [ 1573.109380] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1573.110293] R13: 00007ffe16d2e32f R14: 00007f1f928b5300 R15: 0000000000022000 [ 1573.111227] [ 1573.129029] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1573.130416] EXT4-fs (loop4): get root inode failed [ 1573.130754] EXT4-fs (loop4): mount failed 06:50:54 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x806000000000000}}], 0x2, 0x0) 06:50:54 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:50:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:50:54 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="290000003125aeb5fd"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:50:54 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xffffff8c) [ 1573.227705] loop4: detected capacity change from 0 to 512 06:50:54 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1573.252170] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1573.255658] EXT4-fs (loop4): get root inode failed [ 1573.256020] EXT4-fs (loop4): mount failed 06:50:54 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 2) 06:51:07 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:07 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:07 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 3) 06:51:07 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xffffffe4) 06:51:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:51:07 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)=ANY=[@ANYBLOB="4e00050809386a176bf79db5c47861b87dc7538e5fd9b3909e043d181d440c455ee811fde10e7a97f2a94cd436019bfa197cb37eaeebea44a6058d1ac8c42ad2f432bd5edfb994a7258d6cb289626183c61031a637b0c54d7348ad"], 0x13, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000200)={{0x1, 0x1, 0x5d, r0, {0x40}}, './file0\x00'}) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f00000001c0)) 06:51:07 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xe00000000000000}}], 0x2, 0x0) [ 1586.123687] loop4: detected capacity change from 0 to 512 06:51:07 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1586.152209] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:51:07 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xfffffff6) [ 1586.176500] EXT4-fs (loop4): get root inode failed [ 1586.176856] FAULT_INJECTION: forcing a failure. [ 1586.176856] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1586.177246] EXT4-fs (loop4): mount failed [ 1586.178067] CPU: 0 PID: 9316 Comm: syz-executor.6 Not tainted 6.4.0-next-20230703 #1 [ 1586.179111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1586.179708] Call Trace: [ 1586.179898] [ 1586.180072] dump_stack_lvl+0xc1/0xf0 [ 1586.180373] should_fail_ex+0x4b4/0x5b0 [ 1586.180684] strncpy_from_user+0x38/0x340 [ 1586.181002] getname_flags.part.0+0x95/0x4f0 [ 1586.181348] getname_flags+0x9e/0xf0 [ 1586.181649] user_path_at_empty+0x2f/0x70 [ 1586.181971] path_setxattr+0x92/0x1d0 [ 1586.182263] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1586.182716] ? __pfx_path_setxattr+0x10/0x10 [ 1586.183047] ? ksys_write+0x19e/0x250 [ 1586.183342] ? __pfx_ksys_write+0x10/0x10 [ 1586.183668] __x64_sys_setxattr+0xc4/0x160 [ 1586.183991] ? syscall_enter_from_user_mode+0x21/0x50 [ 1586.184376] do_syscall_64+0x3f/0x90 [ 1586.184660] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1586.185047] RIP: 0033:0x7f1f9533fb19 [ 1586.185317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1586.186592] RSP: 002b:00007f1f928b5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1586.187142] RAX: ffffffffffffffda RBX: 00007f1f95452f60 RCX: 00007f1f9533fb19 [ 1586.187666] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1586.188167] RBP: 00007f1f928b51d0 R08: 0000000000000001 R09: 0000000000000000 [ 1586.188672] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1586.189177] R13: 00007ffe16d2e32f R14: 00007f1f928b5300 R15: 0000000000022000 [ 1586.189700] 06:51:07 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000200)=ANY=[@ANYBLOB="efc81936a161d20e50543a433ad81f8f532e78a540b654b639f29fb7e2ff60f6cee49c2a2aaf8700"/51], 0x13, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) statx(r1, &(0x7f0000000740)='./file0\x00', 0x400, 0x8, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/file0\x00', 0x5, 0x4, &(0x7f00000006c0)=[{&(0x7f00000003c0)="c8f2b8d8e1266e7eb611cb05da22d4f58d91af2675791e329a9d5e85efa49f6dcc90db887d98375f3799866787dc7d7415b45d9d740b5aecc696cc0ec6bd1d0d8b676caa9910309bfccb1cbaff6b0658545237dd706ecef61696bca1ae5cf8dfe0972902decc7b41e25b57409e2635f365a68d61b60bb852806ade9c07aa59cde242a177d2d77c3b991505e5547c72c645b869f8e85f39e86efb46211b4d638304dc73c1f0b5c5572b66ccdf06efe9703ef05ff2e1f1", 0xb6, 0x4}, {&(0x7f0000000480)="ad044fcc36a285fa9ce81204224fd3420be60348f2b254f14381226904d6a239d34cf9416a2c0d4283138596d3dc8b54af5c633e399e10a5a2cc4b3db02531f32e8856ea5d03b86e7b7d070eed73cedc61869131f6ce926b5632f9fb01bf9326d3ba36ea55f4b89a4047000ce526edc1fd4ac1b94a81551e4ba00e7afa6ea9a862483fde05dd115b6db9ac2ed7a90dbf2f3a36ed77af4be38f54adc72779fffed8b49dc39d358ddd45607cf5", 0xac, 0x9}, {&(0x7f0000000540)="82204969f2a6e6b2e3442d6691f260792e3dc61cb4e4845e118535d2", 0x1c, 0x40}, {&(0x7f0000000600)="882b33748cb5bcc754dc68942a54942298e671ca9a7842e0e6ec2b4f6c76c6347b3a6cb2e1cb4a357d81e1b00e30e24982625d4af43a404e6e910956d71f953b4b771b22837eaf6b39ff80cc75ebbd905a3c2de89bec7eb4f88f2433ee6484ee32f1b1294b842eb6e5aa207bf7c9d835b58f737441118ce2d1d537b8b762256868e7c4399527c167c2af35532ffaabc917963fa94dbb0c0e8bbe22a435d3703224dbe774c88a15bd0edce52862a5dd4a41a2121db3d96b", 0xb7, 0x8}], 0x120400, &(0x7f0000000880)={[{@minixdf}, {@delalloc}, {@nouser_xattr}, {@noquota}, {@nomblk_io_submit}, {@init_itable_val={'init_itable', 0x3d, 0x3f}}], [{@dont_measure}, {@obj_user={'obj_user', 0x3d, 'security.evm\x00'}}, {@obj_user}, {@euid_gt={'euid>', r2}}, {@dont_hash}, {@dont_hash}, {@obj_type={'obj_type', 0x3d, 'security.evm\x00'}}]}) sendmsg$NL80211_CMD_SET_WDS_PEER(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40080}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x0, 0x701, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x8, 0x1b}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @random="aff96c473187"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x20040040) [ 1586.234194] loop4: detected capacity change from 0 to 512 06:51:07 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 4) 06:51:07 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xfffffffb) 06:51:07 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x1100000000000000}}], 0x2, 0x0) [ 1586.274640] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:51:07 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="0000ebffffff00"], 0x4) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000580), 0x1040000, &(0x7f00000005c0)={'trans=unix,', {[{@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@debug={'debug', 0x3d, 0x1ff}}], [{@fowner_lt={'fowner<', 0xee01}}]}}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x148, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x120, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x49a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x894a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x140000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x20008815}, 0x4004) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) r2 = socket$netlink(0x10, 0x3, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000140)) ioctl(r1, 0x620, &(0x7f0000000480)="8eba56b0f1f7826e371b31bce5c3914c8cd5842325a4884f51d3e4aaad9cb1c55b0d8fe67e8bd2cded55526089de8f75d5225f2a0bd4b9d709c8039a0ee73e9c573fc712ece3e9167bd5c76837d5beeae87e5e6b15e019cf13014289ac4ae10c480ed908e052b160251170e3e9") sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x24, r0, 0x100, 0x70bd2c, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0xf101}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x4080) [ 1586.303038] EXT4-fs (loop4): get root inode failed [ 1586.304212] EXT4-fs (loop4): mount failed [ 1586.408565] FAULT_INJECTION: forcing a failure. [ 1586.408565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1586.409539] CPU: 0 PID: 9340 Comm: syz-executor.6 Not tainted 6.4.0-next-20230703 #1 [ 1586.410130] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1586.410730] Call Trace: [ 1586.410937] [ 1586.411125] dump_stack_lvl+0xc1/0xf0 [ 1586.411488] should_fail_ex+0x4b4/0x5b0 [ 1586.411785] strncpy_from_user+0x38/0x340 [ 1586.412099] getname_flags.part.0+0x95/0x4f0 [ 1586.412433] getname_flags+0x9e/0xf0 [ 1586.412717] user_path_at_empty+0x2f/0x70 [ 1586.413029] path_setxattr+0x92/0x1d0 [ 1586.413316] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1586.413752] ? __pfx_path_setxattr+0x10/0x10 [ 1586.414078] ? ksys_write+0x19e/0x250 [ 1586.414363] ? __pfx_ksys_write+0x10/0x10 [ 1586.414669] __x64_sys_setxattr+0xc4/0x160 [ 1586.414985] ? syscall_enter_from_user_mode+0x21/0x50 [ 1586.415362] do_syscall_64+0x3f/0x90 [ 1586.415649] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1586.416031] RIP: 0033:0x7f1f9533fb19 [ 1586.416303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1586.417565] RSP: 002b:00007f1f928b5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1586.418100] RAX: ffffffffffffffda RBX: 00007f1f95452f60 RCX: 00007f1f9533fb19 [ 1586.418598] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1586.419096] RBP: 00007f1f928b51d0 R08: 0000000000000001 R09: 0000000000000000 [ 1586.419595] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1586.420099] R13: 00007ffe16d2e32f R14: 00007f1f928b5300 R15: 0000000000022000 [ 1586.420615] 06:51:20 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x4305000000000000}}], 0x2, 0x0) 06:51:20 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000003c0)=ANY=[@ANYBLOB="eb1e6179b0b600fe13fe60c88ec3fcda21c620df29cfb535af3e80c98cb08165a567b53f3a63406bbc1cf450f1c915f35c497a7df69afb06cb9f86b1fc73a9e1fc37133479f5efef094472f295968c79bedfc08326a256e67e996266c262b08dc493683c31b5445eb2f56a7e7684d9d6efc9dce6062aeddf692814a85e665bc1cf3c6e"], 0x13, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="08007af92ab6fe40c7b8d82635f358a4b3838cf3197f000000b8c99476"], 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) read$ptp(r0, &(0x7f00000002c0)=""/204, 0xcc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x820, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x5caa}}, {@aname={'aname', 0x3d, ')$'}}, {@version_L}], [{@fowner_lt}]}}) 06:51:20 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:20 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0d08873c"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) readv(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/186, 0xba}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/82, 0x52}], 0x3) 06:51:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:51:20 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xb) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:20 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 5) 06:51:20 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xfffffffe) [ 1599.159545] FAULT_INJECTION: forcing a failure. [ 1599.159545] name failslab, interval 1, probability 0, space 0, times 0 [ 1599.160427] CPU: 1 PID: 9358 Comm: syz-executor.6 Not tainted 6.4.0-next-20230703 #1 [ 1599.160988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1599.161587] Call Trace: [ 1599.161792] [ 1599.161977] dump_stack_lvl+0xc1/0xf0 [ 1599.162298] should_fail_ex+0x4b4/0x5b0 [ 1599.162571] ? kvmalloc_node+0xaa/0x200 [ 1599.162878] should_failslab+0x9/0x20 [ 1599.163140] __kmem_cache_alloc_node+0x66/0x320 [ 1599.163473] ? kvmalloc_node+0xaa/0x200 [ 1599.163789] ? kvmalloc_node+0xaa/0x200 [ 1599.164074] __kmalloc_node+0x4d/0x160 [ 1599.164355] kvmalloc_node+0xaa/0x200 [ 1599.164632] vmemdup_user+0x26/0x110 [ 1599.164900] setxattr_copy+0x144/0x200 [ 1599.165187] setxattr+0xcb/0x170 [ 1599.165433] ? __pfx_setxattr+0x10/0x10 [ 1599.165727] ? lock_acquire+0x19a/0x4c0 [ 1599.166014] ? find_held_lock+0x2c/0x110 [ 1599.166312] ? __mnt_want_write+0x3c/0x2e0 [ 1599.166616] ? lock_release+0x1e3/0x680 [ 1599.166895] ? __pfx_lock_release+0x10/0x10 [ 1599.167199] ? __pfx_lock_acquire+0x10/0x10 [ 1599.167504] ? kasan_quarantine_put+0x81/0x1d0 [ 1599.167843] ? __mnt_want_write+0x1f4/0x2e0 [ 1599.168158] path_setxattr+0x19b/0x1d0 [ 1599.168441] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1599.168851] ? __pfx_path_setxattr+0x10/0x10 [ 1599.169178] ? __pfx_ksys_write+0x10/0x10 [ 1599.169491] __x64_sys_setxattr+0xc4/0x160 [ 1599.169803] ? syscall_enter_from_user_mode+0x21/0x50 [ 1599.170185] do_syscall_64+0x3f/0x90 [ 1599.170450] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1599.170833] RIP: 0033:0x7f1f9533fb19 [ 1599.170886] loop4: detected capacity change from 0 to 512 [ 1599.171105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.171149] RSP: 002b:00007f1f928b5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1599.173557] RAX: ffffffffffffffda RBX: 00007f1f95452f60 RCX: 00007f1f9533fb19 [ 1599.174071] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1599.174593] RBP: 00007f1f928b51d0 R08: 0000000000000001 R09: 0000000000000000 [ 1599.175117] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1599.175636] R13: 00007ffe16d2e32f R14: 00007f1f928b5300 R15: 0000000000022000 [ 1599.176169] [ 1599.199648] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1599.206618] EXT4-fs (loop4): get root inode failed [ 1599.207117] EXT4-fs (loop4): mount failed 06:51:20 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xd) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1599.238262] loop4: detected capacity change from 0 to 512 [ 1599.265774] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1599.271209] EXT4-fs (loop4): get root inode failed [ 1599.271721] EXT4-fs (loop4): mount failed 06:51:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:51:32 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:32 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xf) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:32 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 6) 06:51:32 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x1500d}, 0x0, 0xffffffffefffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0/file0/file0\x00', 0xc8081, 0x133) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:32 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x8000000000000) 06:51:32 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1c, 0x0, 0x10, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x24004080) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r1 = dup(r0) io_uring_register$IORING_UNREGISTER_BUFFERS(r1, 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz0'}, 0x4) syz_io_uring_setup(0x45c2, &(0x7f00000002c0)={0x0, 0xf516, 0x4, 0x1, 0x398, 0x0, r2}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000340)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r3, 0x400454ce, 0x0) close_range(r1, r3, 0x0) 06:51:32 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x6000000000000000}}], 0x2, 0x0) [ 1611.014743] loop4: detected capacity change from 0 to 512 06:51:32 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:32 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x6558000000000000}}], 0x2, 0x0) [ 1611.047829] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1611.056846] EXT4-fs (loop4): get root inode failed [ 1611.057557] EXT4-fs (loop4): mount failed [ 1611.103372] loop4: detected capacity change from 0 to 512 06:51:32 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x7, 0x7, 0x7, 0x0, 0x7, 0x2800, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x10200, 0x3, 0x8, 0x9, 0x3, 0xffff, 0x6, 0x0, 0xc5}, 0x0, 0x8, r0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:32 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1611.134177] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1611.135686] EXT4-fs (loop4): get root inode failed [ 1611.136026] EXT4-fs (loop4): mount failed 06:51:46 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x8035000000000000}}], 0x2, 0x0) 06:51:46 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x2b) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:46 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r3 = openat$incfs(r0, &(0x7f0000000200)='.log\x00', 0x80, 0x3) sendmsg$TIPC_NL_KEY_FLUSH(r3, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1b0, 0x0, 0x30a, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x30, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x1c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa792}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd57}]}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xd99}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xb0a}]}, @TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfb1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x44050}, 0x40000) open_by_handle_at(r2, &(0x7f00000001c0)=@GFS2_LARGE_FH_SIZE={0x20, 0x8, {{0x40, 0x2, 0xb8e3, 0x4854}, {0x10001, 0x4, 0x5, 0x7000000}}}, 0x40402) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:51:46 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x20000000000000) 06:51:46 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 7) 06:51:46 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:46 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x40, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 1625.113467] loop4: detected capacity change from 0 to 512 [ 1625.118747] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1625.120445] EXT4-fs (loop4): get root inode failed [ 1625.120795] EXT4-fs (loop4): mount failed [ 1625.141403] FAULT_INJECTION: forcing a failure. [ 1625.141403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1625.142216] CPU: 1 PID: 9442 Comm: syz-executor.6 Not tainted 6.4.0-next-20230703 #1 [ 1625.142733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.143279] Call Trace: [ 1625.143463] [ 1625.143631] dump_stack_lvl+0xc1/0xf0 [ 1625.143943] should_fail_ex+0x4b4/0x5b0 [ 1625.144235] _copy_from_user+0x30/0xf0 [ 1625.144510] vmemdup_user+0x6d/0x110 [ 1625.144788] setxattr_copy+0x144/0x200 [ 1625.145066] setxattr+0xcb/0x170 [ 1625.145310] ? __pfx_setxattr+0x10/0x10 [ 1625.145606] ? lock_acquire+0x19a/0x4c0 [ 1625.145891] ? find_held_lock+0x2c/0x110 [ 1625.146182] ? __mnt_want_write+0x3c/0x2e0 [ 1625.146480] ? lock_release+0x1e3/0x680 [ 1625.146758] ? __pfx_lock_release+0x10/0x10 [ 1625.147071] ? __pfx_lock_acquire+0x10/0x10 [ 1625.147375] ? kasan_quarantine_put+0x81/0x1d0 [ 1625.147708] ? __mnt_want_write+0x1f4/0x2e0 [ 1625.148025] path_setxattr+0x19b/0x1d0 [ 1625.148301] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1625.148715] ? __pfx_path_setxattr+0x10/0x10 [ 1625.149035] ? __pfx_ksys_write+0x10/0x10 [ 1625.149333] __x64_sys_setxattr+0xc4/0x160 [ 1625.149632] ? syscall_enter_from_user_mode+0x21/0x50 [ 1625.149994] do_syscall_64+0x3f/0x90 [ 1625.150267] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1625.150633] RIP: 0033:0x7f1f9533fb19 [ 1625.150886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.152063] RSP: 002b:00007f1f928b5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1625.152577] RAX: ffffffffffffffda RBX: 00007f1f95452f60 RCX: 00007f1f9533fb19 [ 1625.153054] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1625.153535] RBP: 00007f1f928b51d0 R08: 0000000000000001 R09: 0000000000000000 [ 1625.154018] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1625.154508] R13: 00007ffe16d2e32f R14: 00007f1f928b5300 R15: 0000000000022000 [ 1625.155009] [ 1625.163804] loop4: detected capacity change from 0 to 512 [ 1625.173889] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1625.175296] EXT4-fs (loop4): get root inode failed [ 1625.175634] EXT4-fs (loop4): mount failed 06:51:46 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x8100000000000000}}], 0x2, 0x0) 06:51:46 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xf0ffffffffffff) 06:51:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40009, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:51:46 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xc0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1625.270050] loop4: detected capacity change from 0 to 512 06:51:46 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1625.280193] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1625.283916] EXT4-fs (loop4): get root inode failed [ 1625.284381] EXT4-fs (loop4): mount failed 06:51:46 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 8) 06:51:46 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x100000000000000) [ 1625.296995] loop4: detected capacity change from 0 to 512 [ 1625.315246] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1625.316842] EXT4-fs (loop4): get root inode failed [ 1625.317210] EXT4-fs (loop4): mount failed 06:51:46 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x86ddffff00000000}}], 0x2, 0x0) [ 1625.374993] FAULT_INJECTION: forcing a failure. [ 1625.374993] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.375788] CPU: 1 PID: 9471 Comm: syz-executor.6 Not tainted 6.4.0-next-20230703 #1 [ 1625.376412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1625.376985] Call Trace: [ 1625.377193] [ 1625.377421] dump_stack_lvl+0xc1/0xf0 [ 1625.377715] should_fail_ex+0x4b4/0x5b0 [ 1625.378068] ? jbd2__journal_start+0x194/0x810 [ 1625.378422] should_failslab+0x9/0x20 [ 1625.378760] kmem_cache_alloc+0x62/0x370 [ 1625.379088] jbd2__journal_start+0x194/0x810 [ 1625.379475] __ext4_journal_start_sb+0x3d7/0x560 [ 1625.379898] ? ext4_xattr_set+0x245/0x370 [ 1625.380227] ? ext4_xattr_set_credits+0x199/0x210 [ 1625.380603] ext4_xattr_set+0x245/0x370 [ 1625.380918] ? lock_is_held_type+0x9f/0x120 [ 1625.381302] ? __pfx_ext4_xattr_set+0x10/0x10 [ 1625.381674] ? inode_has_perm+0x16a/0x1c0 [ 1625.382065] ? xattr_resolve_name+0x26e/0x3e0 [ 1625.382418] ? __pfx_ext4_xattr_security_set+0x10/0x10 [ 1625.382836] __vfs_setxattr+0x175/0x1e0 [ 1625.383182] ? __pfx___vfs_setxattr+0x10/0x10 [ 1625.383524] ? perf_trace_lock+0xc1/0x480 [ 1625.383857] ? lock_is_held_type+0x9f/0x120 [ 1625.384263] __vfs_setxattr_noperm+0x129/0x600 [ 1625.384611] __vfs_setxattr_locked+0x1d7/0x260 [ 1625.384984] vfs_setxattr+0x143/0x340 [ 1625.385339] ? __pfx_vfs_setxattr+0x10/0x10 [ 1625.385668] do_setxattr+0x14b/0x190 [ 1625.385963] setxattr+0x14d/0x170 [ 1625.386285] ? __pfx_setxattr+0x10/0x10 [ 1625.386587] ? lock_acquire+0x19a/0x4c0 [ 1625.386956] ? find_held_lock+0x2c/0x110 [ 1625.387253] ? __mnt_want_write+0x3c/0x2e0 [ 1625.387621] ? lock_release+0x1e3/0x680 [ 1625.387935] ? __pfx_lock_release+0x10/0x10 [ 1625.388254] ? __pfx_lock_acquire+0x10/0x10 [ 1625.388585] ? kasan_quarantine_put+0x81/0x1d0 [ 1625.388976] ? __mnt_want_write+0x1f4/0x2e0 [ 1625.389309] path_setxattr+0x19b/0x1d0 [ 1625.389653] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1625.390149] ? __pfx_path_setxattr+0x10/0x10 [ 1625.390484] ? __pfx_ksys_write+0x10/0x10 [ 1625.390849] __x64_sys_setxattr+0xc4/0x160 [ 1625.391159] ? syscall_enter_from_user_mode+0x21/0x50 [ 1625.391563] do_syscall_64+0x3f/0x90 [ 1625.391899] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1625.392290] RIP: 0033:0x7f1f9533fb19 [ 1625.392621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.393895] RSP: 002b:00007f1f928b5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1625.394437] RAX: ffffffffffffffda RBX: 00007f1f95452f60 RCX: 00007f1f9533fb19 [ 1625.394951] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1625.395467] RBP: 00007f1f928b51d0 R08: 0000000000000001 R09: 0000000000000000 [ 1625.395996] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 1625.396501] R13: 00007ffe16d2e32f R14: 00007f1f928b5300 R15: 0000000000022000 [ 1625.397038] 06:51:47 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) dup(r2) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r0, 0x0, r3, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) statx(r0, &(0x7f0000000000)='./file0\x00', 0x2000, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r4, r5}}, './file0\x00'}) statx(r6, &(0x7f00000000c0)='./file0\x00', 0x400, 0x100, &(0x7f0000001240)) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:51:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:51:47 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:51:47 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x200000000000000) 06:51:47 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x8847000000000000}}], 0x2, 0x0) 06:51:47 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xe0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1625.485901] loop4: detected capacity change from 0 to 512 06:51:47 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1625.505923] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1625.511507] EXT4-fs (loop4): get root inode failed [ 1625.512445] EXT4-fs (loop4): mount failed 06:51:47 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="737980050092a0e287"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = clone3(&(0x7f00000001c0)={0x122b63500, &(0x7f0000000180), 0x0, 0x0, {0x2a}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), 0x0, &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r1, r1], 0x2, {r2}}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x282281, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x4, 0x1, 0x7f, 0x8, 0x0, 0x2, 0x600, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x4, 0x9}, 0x10, 0x0, 0x0, 0x5, 0x401, 0x80000000, 0x9, 0x0, 0x4bbc9534, 0x0, 0x4000000000000000}, r1, 0x0, r3, 0x2) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:00 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 9) 06:52:00 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = clone3(0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000440), {0x2d}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)}, 0x58) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:00 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="2767530191bbcd8c8f2678d18af1e6f5d02bb301f4f2"], 0x13, 0x1) 06:52:00 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xf0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:00 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:52:00 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x400000000000000) 06:52:00 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x8848000000000000}}], 0x2, 0x0) 06:52:00 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 10) [ 1639.129116] loop4: detected capacity change from 0 to 512 [ 1639.159798] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1639.168249] EXT4-fs (loop4): get root inode failed [ 1639.168986] EXT4-fs (loop4): mount failed 06:52:00 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:00 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x8864000000000000}}], 0x2, 0x0) [ 1639.197336] loop4: detected capacity change from 0 to 512 06:52:00 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x1, 0x0, 0x0, 0x2123000, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)=ANY=[@ANYBLOB="789bd576ed1b71ccfaf4d94b3441630199b450e0a70b49ded26f45bf9d63ea33b302f1a48bc86cd83775e03a16f5fb23ed35ff2b9b4385ff765a5c2ba713e158f24d234dc96602155060bf9025980a15b9"], 0x13, 0x1) [ 1639.213017] FAULT_INJECTION: forcing a failure. [ 1639.213017] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.214096] CPU: 1 PID: 9536 Comm: syz-executor.6 Not tainted 6.4.0-next-20230703 #1 [ 1639.214812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.215560] Call Trace: [ 1639.215809] [ 1639.216034] dump_stack_lvl+0xc1/0xf0 [ 1639.216430] should_fail_ex+0x4b4/0x5b0 [ 1639.216825] ? ext4_xattr_block_set+0xb97/0x2fe0 [ 1639.217299] should_failslab+0x9/0x20 [ 1639.217763] __kmem_cache_alloc_node+0x66/0x320 [ 1639.218279] ? ext4_xattr_set_entry+0x507/0x3990 [ 1639.218739] ? ext4_xattr_block_set+0xb97/0x2fe0 [ 1639.219295] ? ext4_xattr_block_set+0xb97/0x2fe0 [ 1639.219761] __kmalloc+0x4a/0x160 [ 1639.220148] ext4_xattr_block_set+0xb97/0x2fe0 [ 1639.220591] ? lock_release+0x1e3/0x680 [ 1639.220987] ? __pfx___ext4_get_inode_loc+0x10/0x10 [ 1639.221565] ? __pfx_ext4_xattr_block_set+0x10/0x10 [ 1639.222058] ? check_xattrs+0x109/0xbf0 [ 1639.222528] ? xattr_find_entry+0x2a7/0x3b0 [ 1639.222949] ? ext4_xattr_ibody_set+0x298/0x3b0 [ 1639.223473] ext4_xattr_set_handle+0xd6e/0x14e0 [ 1639.223941] ? __pfx_ext4_xattr_set_handle+0x10/0x10 [ 1639.224483] ? __pfx_start_this_handle+0x10/0x10 [ 1639.225037] ? __ext4_journal_start_sb+0x3d7/0x560 [ 1639.225571] ? __ext4_journal_start_sb+0x1e0/0x560 [ 1639.226034] ? ext4_xattr_set+0x245/0x370 [ 1639.226469] ext4_xattr_set+0x144/0x370 [ 1639.226943] ? lock_is_held_type+0x9f/0x120 [ 1639.227362] ? __pfx_ext4_xattr_set+0x10/0x10 [ 1639.227894] ? inode_has_perm+0x16a/0x1c0 [ 1639.228313] ? xattr_resolve_name+0x26e/0x3e0 [ 1639.228856] ? __pfx_ext4_xattr_security_set+0x10/0x10 [ 1639.229373] __vfs_setxattr+0x175/0x1e0 [ 1639.229825] ? __pfx___vfs_setxattr+0x10/0x10 [ 1639.230261] ? perf_trace_lock+0xc1/0x480 [ 1639.230676] ? lock_is_held_type+0x9f/0x120 [ 1639.231181] __vfs_setxattr_noperm+0x129/0x600 [ 1639.231636] __vfs_setxattr_locked+0x1d7/0x260 [ 1639.232198] vfs_setxattr+0x143/0x340 [ 1639.232577] ? __pfx_vfs_setxattr+0x10/0x10 [ 1639.233060] do_setxattr+0x14b/0x190 [ 1639.233474] setxattr+0x14d/0x170 [ 1639.233880] ? __pfx_setxattr+0x10/0x10 [ 1639.234347] ? lock_acquire+0x19a/0x4c0 [ 1639.234735] ? find_held_lock+0x2c/0x110 [ 1639.235197] ? __mnt_want_write+0x3c/0x2e0 [ 1639.235643] ? lock_release+0x1e3/0x680 [ 1639.236030] ? __pfx_lock_release+0x10/0x10 [ 1639.236540] ? __pfx_lock_acquire+0x10/0x10 [ 1639.236964] ? kasan_quarantine_put+0x81/0x1d0 [ 1639.237419] ? __mnt_want_write+0x1f4/0x2e0 [ 1639.237848] path_setxattr+0x19b/0x1d0 [ 1639.238231] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1639.238878] ? __pfx_path_setxattr+0x10/0x10 [ 1639.239312] ? __pfx_ksys_write+0x10/0x10 [ 1639.239713] __x64_sys_setxattr+0xc4/0x160 [ 1639.240207] ? syscall_enter_from_user_mode+0x21/0x50 [ 1639.240697] do_syscall_64+0x3f/0x90 [ 1639.241177] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1639.241769] RIP: 0033:0x7f1f9533fb19 [ 1639.242197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.243994] RSP: 002b:00007f1f928b5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1639.244809] RAX: ffffffffffffffda RBX: 00007f1f95452f60 RCX: 00007f1f9533fb19 [ 1639.245553] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1639.246209] RBP: 00007f1f928b51d0 R08: 0000000000000001 R09: 0000000000000000 [ 1639.246955] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000002 [ 1639.247634] R13: 00007ffe16d2e32f R14: 00007f1f928b5300 R15: 0000000000022000 [ 1639.248361] 06:52:00 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x1000000000000000) [ 1639.288559] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1639.292638] EXT4-fs (loop4): get root inode failed [ 1639.293160] EXT4-fs (loop4): mount failed 06:52:01 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="73790130"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r1, 0x0, r2, 0x0, 0x4, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000ffffdf250f00000008002b00c338000005002f00010000000500380000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4044}, 0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000001400)=ANY=[@ANYBLOB="01000000010000001800004643952869a6650a89870844ec9d7aeaa19f428e105271de54402716e845d0b003346b4d0d1b54db50a1104d206e473d41ac1ec756ea460809832682df35e94d66d89de1569916cda07980258284047a1589be45015a12ca19824e3c14061c2d26dc149349d67814fb1b39a055f1599add9b0e0e459f77289311d1ed60dbc582c019cc000cad198b74890b0c80726f83ad1b1a717152eb04b4e4bd6a408a4d9c809b814090cf3663d6d2c25d9a97a5e05d8a5963adeba119fcbeb123f14894925d2d4e1f32359967ccfb8163ad8ecdc6d82049ff07e150413e8a10ac64164c68309a793f50d63a6cb36de7ee498eabf9755c3b797b3271d7b0ef1be346ce856548ab556e80773d057658ec0483f763671e30f55ab9cb5a7b590ed102838f648ca44193d217b0c033179e9a869e2bee8db09d637125b816fcb0129b781c90028aca5f6c73507f755ce9536be609d771edb8913764bb321051dc7811c5542eec17cc64ff6227c55c3cb0c6bf791c8e50a6302a0ffeae2014", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$NL80211_CMD_GET_INTERFACE(r5, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x28, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x200, 0x3}}}}, ["", "", ""]}, 0x28}}, 0x8891) ioctl$TUNSETSNDBUF(r4, 0x400454ce, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000200), 0x281, 0x0) splice(r4, &(0x7f00000001c0)=0xffff, r3, &(0x7f0000000240)=0x7ff, 0x7, 0x1) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:13 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x88a8ffff00000000}}], 0x2, 0x0) 06:52:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:52:13 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = clone3(&(0x7f00000001c0)={0x122b63500, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {0x2a}, 0x0, 0x0, 0x0, 0x0}, 0x58) write(r4, &(0x7f00000017c0)="c9ff1427fe687559d30e2f5eed31ecf7c088236cfb1512f40ce98e7ac12ff5fb76ea7d873c60b651aedfc62268b0fa9b09b4f9c8d036109e46726c74195a3de5dae98a710d5e0a617de06feca7eaeccf49511ee7755fca62a4c22d6578137dfb02aa638a0e8b411d51bed2d49a54304ccd67204be1a114cf749b56814c676d1d19e692156535698bfbcaf74c2d9ab8a9b636bf969728335c8f7b1c2f6e348e92d2fe0dec4ab82f81b7e89f0eec38e724a88b4c361585f1a2ecb23398e9f338310b4d2b4e456169e01ba1f0b942af6ad82adb5d73f9543a2312c4dab7597d60c4048aae48d537a3d7e98d", 0xea) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r6 = clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), 0x0, &(0x7f0000000440)=0x0, {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r3, r3], 0x2, {r5}}, 0x58) ioctl(r2, 0x5, &(0x7f00000006c0)="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") r8 = clone3(&(0x7f00000001c0)={0x122b63500, &(0x7f0000000180), 0x0, 0x0, {0x2a}, 0x0, 0x0, 0x0, 0x0}, 0x58) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), 0x0, &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r8, r8], 0x2, {r9}}, 0x58) clone3(&(0x7f0000001740)={0x80020000, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), {0x3b}, &(0x7f0000000300), 0x0, &(0x7f00000016c0)=""/90, &(0x7f0000000540)=[r6, r3, r8, r6, r7], 0x5, {r0}}, 0x58) perf_event_open(&(0x7f0000000580)={0x1, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x0, 0x0, 0x4}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000018c0)=ANY=[@ANYBLOB="22849ae10f89c489c426420db143712eef71eefd8a6318ff2ba6505611b8fd4b8439a1d8eb12fce99e4ee3280db5ffa90c9c104c8792ccc7f1e7eb1d1b37b5b2de168594ed9b6e32a02aae867e7fa32fac9dc51393ccb70ab50969067732bfc932d7d3a696c50000e1e5f60c821f796067520040918453b0597700000000000000"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:13 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xf8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:13 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 11) 06:52:13 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20040080) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=ANY=[@ANYBLOB="fd71aa4dc358f5c673462db43ef5c7e8b5b3c6ba14938880f095c23919c263892dace71f41e427f59c67ecc90dfcd81a8ffd9785d05f48dfa1e25d13f257ad9c8bec4477b8cae95f13f7f971b8d9c121929f87063cebf8b5c2ccab811ace1ce6406c238d567d0dbd53658e4a66b3f727e81e25d81d0e6f6a8a7b2590900de46675000000"], 0x13, 0x1) 06:52:13 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:13 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x1400000000000000) [ 1652.153966] loop4: detected capacity change from 0 to 512 [ 1652.175805] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1652.191235] EXT4-fs (loop4): get root inode failed [ 1652.191592] EXT4-fs (loop4): mount failed [ 1652.212769] loop4: detected capacity change from 0 to 512 [ 1652.239312] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1652.241623] EXT4-fs (loop4): get root inode failed [ 1652.242026] EXT4-fs (loop4): mount failed 06:52:27 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 12) [ 1665.936095] loop4: detected capacity change from 0 to 512 06:52:27 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x2103000000000000) 06:52:27 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000001c0)={0x2008}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7379e8ff"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=ANY=[@ANYBLOB="f19f4f70767fb8604c00a9ac052b62179e175cb10e0127e44a7aeb1bd11c35e8fb5090618c889156927361cfc420aa2e741bc49aa0690c32099382a685e95326d76c81e7ecea241f5b8d07f2094eb7b05dbd0f6c8cb53f8bd3696abf384ea05ec90cf7eec2cc7d0585c585b3b95e9c91923d254706e64ccb22d26c5dfeef6ac01772f0ddc6161e0f62d76d0f46ac0d05e300b413a5"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0xe20, 0x0, @empty}, 0x1c) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000200)) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x3) 06:52:27 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:27 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xfc) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:27 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)={{0x10b, 0x81, 0x1f, 0x264, 0x1cb, 0x8, 0x1b5, 0xdc}, "218f9c35dedfb891c8370eb9b660f913e7f0b9a57cdf22022ae1a33a8961215c08a02fbc8fb319a08dbb97a1ad2f477aa9e4a921e5f7d4143dcc62ca383b0547d2324ac53d7edb6b3c08c1c99f5c21f0d87ac9a4bf81e2c24100591db014efe8f3c7e72024b3356cf8fa88ad77f268373e2ea315de98f86507575803bf14931fde020b44a42dde375c7ca52e999b1d46d28ccf4a1bd4f32f3172a23988c5513710980361", ['\x00']}, 0x1c4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:52:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:52:27 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x88caffff00000000}}], 0x2, 0x0) [ 1665.948927] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1665.950493] EXT4-fs (loop4): get root inode failed [ 1665.950852] EXT4-fs (loop4): mount failed [ 1665.962984] loop4: detected capacity change from 0 to 512 [ 1665.972202] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1665.974279] EXT4-fs (loop4): get root inode failed [ 1665.974647] EXT4-fs (loop4): mount failed [ 1665.982316] FAULT_INJECTION: forcing a failure. [ 1665.982316] name failslab, interval 1, probability 0, space 0, times 0 [ 1665.983705] CPU: 1 PID: 9600 Comm: syz-executor.6 Not tainted 6.4.0-next-20230703 #1 [ 1665.984617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1665.985546] Call Trace: [ 1665.985857] [ 1665.986133] dump_stack_lvl+0xc1/0xf0 [ 1665.986623] should_fail_ex+0x4b4/0x5b0 [ 1665.987107] ? ext4_mb_new_blocks+0x64a/0x4630 [ 1665.987690] should_failslab+0x9/0x20 [ 1665.988147] kmem_cache_alloc+0x62/0x370 [ 1665.988686] ext4_mb_new_blocks+0x64a/0x4630 [ 1665.989284] ? find_held_lock+0x2c/0x110 [ 1665.989788] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1665.990381] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1665.991108] ext4_new_meta_blocks+0x1e5/0x320 [ 1665.991706] ? __pfx_ext4_new_meta_blocks+0x10/0x10 [ 1665.992379] ? __entry_find+0x370/0x4b0 [ 1665.992923] ext4_xattr_block_set+0x167b/0x2fe0 [ 1665.993499] ? lock_release+0x1e3/0x680 [ 1665.994004] ? __pfx_ext4_xattr_block_set+0x10/0x10 [ 1665.994619] ? check_xattrs+0x109/0xbf0 [ 1665.995110] ? xattr_find_entry+0x2a7/0x3b0 [ 1665.995683] ? ext4_xattr_ibody_set+0x298/0x3b0 [ 1665.996325] ext4_xattr_set_handle+0xd6e/0x14e0 [ 1665.996912] ? __pfx_ext4_xattr_set_handle+0x10/0x10 [ 1665.997531] ? __pfx_start_this_handle+0x10/0x10 [ 1665.998135] ? __ext4_journal_start_sb+0x3d7/0x560 [ 1665.998736] ? __ext4_journal_start_sb+0x1e0/0x560 [ 1665.999353] ? ext4_xattr_set+0x245/0x370 [ 1665.999862] ext4_xattr_set+0x144/0x370 [ 1666.000379] ? lock_is_held_type+0x9f/0x120 [ 1666.000952] ? __pfx_ext4_xattr_set+0x10/0x10 [ 1666.001516] ? inode_has_perm+0x16a/0x1c0 [ 1666.002028] ? xattr_resolve_name+0x26e/0x3e0 [ 1666.002583] ? __pfx_ext4_xattr_security_set+0x10/0x10 [ 1666.003194] __vfs_setxattr+0x175/0x1e0 [ 1666.003706] ? __pfx___vfs_setxattr+0x10/0x10 [ 1666.004253] ? perf_trace_lock+0xc1/0x480 [ 1666.004794] ? lock_is_held_type+0x9f/0x120 [ 1666.005335] __vfs_setxattr_noperm+0x129/0x600 [ 1666.005918] __vfs_setxattr_locked+0x1d7/0x260 [ 1666.006510] vfs_setxattr+0x143/0x340 [ 1666.006986] ? __pfx_vfs_setxattr+0x10/0x10 [ 1666.007547] do_setxattr+0x14b/0x190 [ 1666.008022] setxattr+0x14d/0x170 [ 1666.008477] ? __pfx_setxattr+0x10/0x10 [ 1666.008977] ? lock_acquire+0x19a/0x4c0 [ 1666.009467] ? find_held_lock+0x2c/0x110 [ 1666.009970] ? __mnt_want_write+0x3c/0x2e0 [ 1666.010491] ? lock_release+0x1e3/0x680 [ 1666.010978] ? __pfx_lock_release+0x10/0x10 [ 1666.011514] ? __pfx_lock_acquire+0x10/0x10 [ 1666.012033] ? kasan_quarantine_put+0x81/0x1d0 [ 1666.012651] ? __mnt_want_write+0x1f4/0x2e0 [ 1666.013202] path_setxattr+0x19b/0x1d0 [ 1666.013684] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1666.014389] ? __pfx_path_setxattr+0x10/0x10 [ 1666.014918] ? __pfx_ksys_write+0x10/0x10 [ 1666.015455] __x64_sys_setxattr+0xc4/0x160 [ 1666.015974] ? syscall_enter_from_user_mode+0x21/0x50 [ 1666.016616] do_syscall_64+0x3f/0x90 [ 1666.017080] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1666.017715] RIP: 0033:0x7f1f9533fb19 [ 1666.018156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1666.020194] RSP: 002b:00007f1f928b5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1666.021095] RAX: ffffffffffffffda RBX: 00007f1f95452f60 RCX: 00007f1f9533fb19 [ 1666.021910] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 1666.022724] RBP: 00007f1f928b51d0 R08: 0000000000000001 R09: 0000000000000000 [ 1666.023557] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000002 [ 1666.024367] R13: 00007ffe16d2e32f R14: 00007f1f928b5300 R15: 0000000000022000 [ 1666.025242] 06:52:27 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:27 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x7, 0x1, 0x401, 0x0, 0x0, {0xc, 0x0, 0x1}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x24048800) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)=ANY=[@ANYRESDEC=r0], 0x13, 0x2) 06:52:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40010, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:52:27 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x8bffffff00000000) 06:52:27 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1cc) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:27 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x88f7ffff00000000}}], 0x2, 0x0) [ 1666.119570] loop4: detected capacity change from 0 to 512 [ 1666.132840] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1666.135589] EXT4-fs (loop4): get root inode failed [ 1666.135943] EXT4-fs (loop4): mount failed 06:52:27 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40011, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:52:27 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) (fail_nth: 13) 06:52:27 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000340)=[{&(0x7f00000001c0)="afcb15236637ad73c199927c178fc23642ba8f1d4b26f7a0d17da73fc2890f22bd5aeba6c8a38fdf2a41d6c5cdf18d38abbe156d331a75be8a47cb89a2f8e7e89b986482daab635b94ec4ac750851df34de5d980067eade0f7bd665f0667bb4ebe207196b911af851af902e309beeb93f9aa93ec882a22", 0x77, 0x9}, {&(0x7f0000000240)="4d9b7df94deee54333031ff036818ee30288efb590fee1e23cbd7b52a81a84e6bcc1d991b5d8cd9ecd074f6214feb5c666a4f0c89ef4ea06c30aa8242d23d45fef552295f15b76ec13c5f28abf66372ebdd580c38160bf45418ffc393b44b0e9bb715f746d49625e666cccd3dfbc53850e06a8cfc81fd8ccc7e7d876632182677c6882aca0686235616c3a045d6bffe2f0350b9a0e98a96ccd20adab4afc0e94342b9b30a563b197dde865d90beead47718900d90b8d63d8d708bddaef38a29816dfecafd4358aa1ea5e3162a3c00809d51919fd12791e8f91891db9c80a7342b1b006777bbcace9c34c7626f630", 0xee, 0xffffffffffffffff}], 0x5, &(0x7f0000000380)={[{@journal_path={'journal_path', 0x3d, './file0'}}, {@delalloc}, {@delalloc}, {@bsdgroups}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@appraise_type}, {@uid_gt={'uid>', 0xee01}}, {@dont_hash}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, ']*'}}, {@appraise}, {@dont_hash}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz0'}}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r3, 0x8008f512, &(0x7f00000004c0)) pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) close(r0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 1666.263599] FAULT_INJECTION: forcing a failure. [ 1666.263599] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1666.264744] CPU: 0 PID: 9648 Comm: syz-executor.6 Not tainted 6.4.0-next-20230703 #1 [ 1666.265274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1666.265831] Call Trace: [ 1666.266019] [ 1666.266183] dump_stack_lvl+0xc1/0xf0 [ 1666.266471] should_fail_ex+0x4b4/0x5b0 [ 1666.266773] _copy_from_user+0x30/0xf0 [ 1666.267057] kstrtouint_from_user+0xb0/0x170 [ 1666.267382] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1666.267747] ? lock_acquire+0x19a/0x4c0 [ 1666.268045] ? ksys_write+0x122/0x250 [ 1666.268333] proc_fail_nth_write+0x7c/0x230 [ 1666.268680] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1666.269056] ? lock_is_held_type+0x9f/0x120 [ 1666.269383] vfs_write+0x2b9/0xda0 [ 1666.269644] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1666.269995] ? __pfx_vfs_write+0x10/0x10 [ 1666.270291] ? __fget_files+0x267/0x480 [ 1666.270606] ksys_write+0x122/0x250 [ 1666.270867] ? __pfx_ksys_write+0x10/0x10 [ 1666.271176] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1666.271566] do_syscall_64+0x3f/0x90 [ 1666.271862] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1666.272241] RIP: 0033:0x7f1f952f25ff [ 1666.272515] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1666.273799] RSP: 002b:00007f1f928b5170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1666.274358] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1f952f25ff [ 1666.274876] RDX: 0000000000000001 RSI: 00007f1f928b51e0 RDI: 0000000000000003 [ 1666.275404] RBP: 00007f1f928b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1666.275923] R10: 0000000000000013 R11: 0000000000000293 R12: 0000000000000002 [ 1666.276454] R13: 00007ffe16d2e32f R14: 00007f1f928b5300 R15: 0000000000022000 [ 1666.276989] 06:52:27 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x8cffffff00000000) 06:52:27 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:52:27 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:28 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:52:28 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x88fbffff00000000}}], 0x2, 0x0) 06:52:39 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x8902000000000000}}], 0x2, 0x0) 06:52:39 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="020ebddb423b00000000"], 0x13, 0x1) 06:52:39 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x3f, 0x1, 0x1, 0x9d, 0x0, 0x800, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffff7f, 0x1, @perf_config_ext={0x3, 0x5}, 0xc420, 0x6, 0x8c678698, 0x6, 0x400, 0x2572, 0x0, 0x0, 0x1ff, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x505652e8780eaad6) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:39 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)=ANY=[@ANYBLOB="b0a075e7097500c1d39eb1564f0b075deb3ee1319205e4d640e82900f8f41fd87f5ceb31433b7fd859574ad4824cd1267a43e8365a5dcdea26e2a1fadf17cd8c0732f31ff7bc5c096b0b1eb77da84862a7f73cd96a5359528ef140252265e799088fef066b82e3add47bde2f16db0d108b2b52475447c55d9c8b15bfd301be6a5941949294c95f7d710ff62ac922f96393869708664576d40027e9bdb0d647ff71bbf97baa72f50293a70e32740960d4518d26a26a985100ac0722adc9528e2b72ce8df9678f5c247b6898da6f4c951e3be64cc1"], 0x13, 0x3) 06:52:39 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:39 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1fd) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:39 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xe4ffffff00000000) 06:52:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40014, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1678.351759] loop4: detected capacity change from 0 to 512 [ 1678.364057] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1678.371975] EXT4-fs (loop4): get root inode failed [ 1678.372386] EXT4-fs (loop4): mount failed [ 1678.385398] loop4: detected capacity change from 0 to 512 [ 1678.398184] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1678.401723] EXT4-fs (loop4): get root inode failed [ 1678.402078] EXT4-fs (loop4): mount failed 06:52:40 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xf6ffffff00000000) 06:52:40 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x8906000000000000}}], 0x2, 0x0) 06:52:40 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="030ebddb423b00000000"], 0x13, 0x1) 06:52:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40024, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:52:40 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x3aa, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="8d99e0d4f4c5baf575f50dfe41ec5d90aff525dfdc0eef6bff14e41164b0ca7fa5e5d332c3ca67d0be620c3eb52cf76a9e99fb08b287ceb62b50e84adc90848b97b3f4c7eac51059c105faa0638f57ffdda5bbbc3cc47785b199a308c0e352d67cf21d732a7a39772e7877a3b6263237ef6c7bf43126bf8a6ec8f072516db08753f0092e17a6c7f1fbfab22fb8e30dc127fd074287a906c23d202ca9cb120c975494374ab478cfba2553c6fd0755285371ffdf9a4726c138db61f4bb2f31d563c215b190fdaaf092e7c0b0d707"], 0x13, 0x1) 06:52:40 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x892f000000000000}}], 0x2, 0x0) 06:52:40 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="0f0ebddb423b00000000"], 0x13, 0x1) 06:52:40 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{0x107, 0xe2, 0xb, 0xe7, 0xd6, 0x1, 0x78, 0x8}, "1db330e21e6c301d61e96e3d68fd84fd165d9d85c4f92309df1ce98647fe45028de53ac55f65dadf4f4dd7bdccd4eb2e8622925bdd524db536a5086c47f2fd85f269566a9af0aae5a43518d514f00fbe2e888366cb18abcfa0aaacfac6dd592bc2de952c359e212a8027b584ee", ['\x00']}, 0x18d) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r2, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x94, 0xd, 0x6, 0x70c, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xe}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1678.593744] loop4: detected capacity change from 0 to 512 06:52:40 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1678.631398] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1678.653219] EXT4-fs (loop4): get root inode failed [ 1678.653907] EXT4-fs (loop4): mount failed 06:52:40 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000200)=ANY=[@ANYBLOB="42383ab7be2ba6c70fdbcc361be39f154da0c3dddcd3af2ea907c753a70777372c4e021779451b1d515c8b0156d0ed5b9516c8cec22f6fd7ec742f328b"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:40 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x9, 0x20400) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x14012408}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r1, 0x4, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}]}, 0x38}, 0x1, 0x0, 0x0, 0x4800}, 0x1) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:52:57 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xdc05000000000000}}], 0x2, 0x0) 06:52:57 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xfbffffff00000000) 06:52:57 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x821) mount(&(0x7f0000000000)=@sr0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bfs\x00', 0x0, &(0x7f00000001c0)='syz0') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRES64], 0x13, 0x1) 06:52:57 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040fbddb423b00000000"], 0x13, 0x1) 06:52:57 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:57 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x700) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40043, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:52:57 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="73e1a1dfa855070030"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1696.146724] loop4: detected capacity change from 0 to 512 [ 1696.168601] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1696.186655] EXT4-fs (loop4): get root inode failed [ 1696.187170] EXT4-fs (loop4): mount failed [ 1696.212787] loop4: detected capacity change from 0 to 512 [ 1696.238814] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1696.250587] EXT4-fs (loop4): get root inode failed [ 1696.251392] EXT4-fs (loop4): mount failed 06:52:57 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xe005000000000000}}], 0x2, 0x0) 06:52:57 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xfeffffff00000000) 06:52:57 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:52:57 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb42fd01000000"], 0x13, 0x1) 06:53:12 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:12 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b02000000"], 0x13, 0x1) 06:53:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40048, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:53:12 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="01797a30"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=ANY=[@ANYBLOB="a9c0e1c5caf1b7776db3a1f9863db61ff8bfcfa2d3aac458412f0eaf673b6a94f64adeb2a71a14ea78315de4d22534b8d4eaed7593f453deeb859f7d55cdfcdd77190cd9259c409a29bee397cd7b99411b45f1960900d411b4b326d92e59c531e081604300f88b8086cfb962e48abd254fd8ecad0ccea26835e45fece86b7d54b79150820cfc867dc7cc9ca91351266db6c055925471efde67c6a4b0"], 0x13, 0x1) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000200)='\'\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='security.evm\x00'], &(0x7f0000000500)=[&(0x7f0000000480)='security.evm\x00', &(0x7f00000004c0)='-[\x00']) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:12 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xff01000000000000) 06:53:12 executing program 1: pipe2(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000)=0x4, r0, &(0x7f00000000c0)=0x3, 0x8, 0x5) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) dup(r2) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x2, 0x8, 0x311, 0x6, 0x9, 0xffffffffffffffc0}, {0x0, 0x39, 0x8, 0x6, 0x8001, 0x100}], ['\x00', '\x00', '\x00']}) 06:53:12 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xeffdffff00000000}}], 0x2, 0x0) 06:53:12 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xe63) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1711.210103] loop4: detected capacity change from 0 to 512 06:53:12 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xffffffff00000000) [ 1711.248237] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1711.257870] EXT4-fs (loop4): get root inode failed [ 1711.258567] EXT4-fs (loop4): mount failed 06:53:12 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0xffffff7f00000000}}], 0x2, 0x0) 06:53:12 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xa800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1711.320572] loop4: detected capacity change from 0 to 512 06:53:12 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f00000006c0)={0x5, 0xb, 0x2, 0x0, 0x1, [{0x4, 0x401, 0x101, '\x00', 0x2200}]}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r2, &(0x7f0000000780)={r3, r0, 0x6}) vmsplice(r1, &(0x7f0000000640)=[{&(0x7f00000002c0)="3fcce38e0944e98202844cd297b812868e13e7430aa73ab233ee305993d14569905d071dfcfcf9169874da3e55357ad6ef044250209d5b7f244fbff8cf50de81806e14afae051b65429b52c53a51b4ace77e96259a4a80561adeeb050c8c14e63c8283b251f53c85822867c85e87157e4408c14871bcc7a48a50dcabdc96f9c39138099933904b88b32dfb576f1c523d8c63dbf34b6d084c8b57249ae74eee77fbd16cf2d72ba4885a5b7ca13e660c85e1b420f1936e5f4b4f468d12c0aa62c43154164f76394650a033bf860d3c0e5c5805c0b27cf25eff6060753cf56b", 0xde}, {&(0x7f00000000c0)="02ed4c17722c1992941666782f82740a61d5c263ede6158187cafd28aa13ab435cd9b059a6451353b70d80e5f8e30886", 0x30}, {&(0x7f00000001c0)="a15d4f08", 0x4}, {&(0x7f0000000200)="e96941ecc5e63aaa12c59a2e8bc5d94e348c7572674f3cc472d512289969", 0x1e}, {&(0x7f00000003c0)="6f5eeccd165c923c704670f73842df027e577c00466a61a3ea639c1485d0838a53841191b204a3a23d8cbfbeaed17c04f5783d90618d643f22f60301303423b736ce80e7ce59df6e76f640618777258179f50f09b54b373fa63715bd557a4540441d48f8699eb896fef4431f09772fb893a5ffc534632afb30779b46204ac45402b13a26f6f4d2a9e58f9811e95145a7e30d3c76da3117e2542d21ce6cb0221f7a27da1fec6e06156990b260e9c58e181dc4", 0xb2}, {&(0x7f0000000240)="1e047bca789f7a1c36e85fff14f095e1025e7db6683c29afa372fd24bddb78c67a359c623a74f5a5d98565a59e", 0x2d}, {&(0x7f0000000480)="4a47ff7a8848e12712a86a70dfdc00f0cbfd91616e68b1af8d99811e341acd9b513ca35ef32e0be34ab28b3bbb993a532522629d6e00f2156452d2064d35bbcd2af96ae7d3e69f98d1a21a42650a9fa59a47ad49773ff3addf2a10d63ae1cded69ab603c1b0d9b750b7378edb0a470ec10a9ff0cd17665b1466ff4d258779078c9fbe544c29d5858a7407f92f8c92f7700c353e17f4a5efef57c3b45a88c3b48b7167bf16cfc1e6f871323db17307f2fb83d4366ac332361c6fd213eddd1cdafe4cb4a72a0b5d4fc6807923bcc656782c861518371dd3eb70d5f75670b3b31ab99", 0xe1}, {&(0x7f0000000580)="6e01fad599d826c60c9ad14902f4f2ec15b38c703cb632a887820cccdccaacd6a98b1529655f92a1b3fab5fea1fcc4f2d887a9429d4e9dd5737d0c02dd1814048d88fa46c5f311b1a1a9252f7114a0904508af93ae47db354e66dc972cd57b09e28154aa22e538cae956bc1c812e9ac737dc40f0b7ba0c5b2f2bf0d950ad0d47770204cdfc13b68549a1300ab2db817364b477ffe6bde3d7d97ebacd7f4d1a457dc9afa79048", 0xa6}], 0x8, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454ce, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$TUNSETSNDBUF(r4, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)=ANY=[@ANYRESOCT=r4], 0x13, 0x1) [ 1711.346901] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1711.359488] EXT4-fs (loop4): get root inode failed [ 1711.360277] EXT4-fs (loop4): mount failed 06:53:13 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0xfffffffffffff000) 06:53:13 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b03000000"], 0x13, 0x1) [ 1724.521750] loop4: detected capacity change from 0 to 512 06:53:26 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0) 06:53:26 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b04000000"], 0x13, 0x1) 06:53:26 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:26 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="6134477e1876c99f72"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = clone3(&(0x7f00000001c0)={0x122b63500, &(0x7f0000000180), 0x0, 0x0, {0x2a}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x9, 0x7, 0xff, 0x6, 0x0, 0x1, 0x50275, 0x5, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xf2, 0x2, @perf_bp={&(0x7f0000000240), 0x2}, 0x2000, 0x80, 0x2, 0x5, 0x7fff, 0x6, 0x80, 0x0, 0x6, 0x0, 0x5}, r3, 0x10, 0xffffffffffffffff, 0x9) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x200000, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), 0x0, &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r2, r2], 0x2, {r4}}, 0x58) fcntl$lock(r1, 0x24, &(0x7f00000001c0)={0x1, 0x4, 0x2, 0x80, r2}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:26 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000001240)=ANY=[@ANYBLOB="20fb00006d15d0243fb616e7b4e0cc7cdbbe6107d6b8f62f1f4f593a71fe91d4efa73389c8957a645672dc71041797e3c6be6470a72aaff5bebc6084198a17e4e44f09d257a72161518cd6bb2ed549d7e59740f19a100ba289e9618e5f04d6b2ca8722cc9f878e6fe90abee2d975b242a2fab41a33d3852a657c6e7e1ad03cf47643325a6d914a719f9fe9e43022de07a0", @ANYRES16=r2, @ANYBLOB="000229bd7000fbdbdf25080000000c009900030000007c000000"], 0x20}, 0x1, 0x0, 0x0, 0x801}, 0x8000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:53:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4004c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:53:26 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0xfd01) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:26 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x1, 0x0, 0x0, 0x1002000, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 1724.564057] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1724.565626] EXT4-fs (loop4): get root inode failed [ 1724.566014] EXT4-fs (loop4): mount failed 06:53:26 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x80000) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1724.584509] loop4: detected capacity change from 0 to 512 06:53:26 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b08000000"], 0x13, 0x1) [ 1724.599286] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1724.600779] EXT4-fs (loop4): get root inode failed [ 1724.601353] EXT4-fs (loop4): mount failed 06:53:26 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7335a8bf"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:53:26 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8}}], 0x2, 0x0) 06:53:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40060, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:53:26 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1724.700339] loop4: detected capacity change from 0 to 512 06:53:26 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b10000000"], 0x13, 0x1) 06:53:26 executing program 1: pipe2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 1724.717912] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1724.719804] EXT4-fs (loop4): get root inode failed [ 1724.720206] EXT4-fs (loop4): mount failed 06:53:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40068, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:53:41 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xe}}], 0x2, 0x0) 06:53:41 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)=ANY=[@ANYRES64], 0x13, 0x0) r2 = syz_io_uring_complete(0x0) write$tun(r2, &(0x7f00000000c0)={@void, @val={0x1, 0x4, 0x800, 0x5, 0x200, 0x9}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}, @private=0xa010102, @empty, @private=0xa010101}}, 0x26) 06:53:41 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:41 executing program 1: pipe2(0x0, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:checkpolicy_exec_t:s0\x00', 0x28, 0x1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:53:41 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) r2 = memfd_secret(0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r2, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r3, 0x2, 0x70bd29, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x6, 0x76}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x404c004) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000380)=ANY=[@ANYBLOB="cb21838e8dfaafa2b52b1b00e9619e01454d7475cb282842ccca2a7d80ab9c7beab5e32d62ff97e063a7815fcb1d8def9b75a9b7d3fb4fee6c8557229b6a075e24caa6b5f1ef5c8dedaed0ada3bb2160bdf2d97cc408dcce"], 0x13, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r5, &(0x7f0000000140)={'syz0'}, 0x4) renameat2(r5, &(0x7f0000000300)='./file0\x00', r4, &(0x7f0000000340)='./file0/../file0\x00', 0x6) 06:53:41 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b14000000"], 0x13, 0x1) 06:53:41 executing program 2: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000280)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0xec, &(0x7f0000000300)={[{0xe6, 0x4e00, "639283975572c122aa3b6b5fcee720ac1ed917eb1f1968105cb9994216bd5cab368621645da192d9b613c6cdf3bab5eed949d41ed1237f71ce6a4c63e1ccc1ef7f8670d5f29e6fa72a083c833a9073cd9177f702d5d55a549ea95c1b6db80107564728018240d5e84133a4b363632e46cc979614cb177da83dfb0f4c7677005c7724f642e2fe1dcc657d103a2adcfdf332fbe4e2cfc9c36a56c5407b51b50247ef3e88897fa92aaa2dc2349d5cf5619c87eecdf0ea54a3d838521c9dc97e1cd0b2b18bfebd6bac051438a3769c857624fc8e7893429eaa72d82588ec2d82959157a8e4804e64"}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x26800, 0x0) write$vga_arbiter(r3, &(0x7f0000000200)=@other={'unlock', ' ', 'none'}, 0xc) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000240)=0x3, 0x4) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2083}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1739.785084] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1739.802720] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1739.803558] loop4: detected capacity change from 0 to 512 [ 1739.834242] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1739.843527] EXT4-fs (loop4): get root inode failed [ 1739.844209] EXT4-fs (loop4): mount failed 06:53:41 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x11}}], 0x2, 0x0) [ 1739.880004] loop4: detected capacity change from 0 to 512 [ 1739.922085] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:53:41 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x4c, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0xa2}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x6}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x9e}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x7f}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x7}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x81}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="04db423b0008", @ANYRES16], 0x13, 0x0) [ 1739.932683] EXT4-fs (loop4): get root inode failed [ 1739.933393] EXT4-fs (loop4): mount failed 06:53:41 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0/file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x200000, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7}}, './file0/file0\x00'}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="b5ee02ba2a09dc053eabd0d0219d769caae411e5ccedf6d6fdb84eb1b9ea21365850433a667e832842557f98d4c5302aed27", 0x32}], 0x1, 0x7ff, 0x3f4) 06:53:41 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bf0000000"], 0x13, 0x1) 06:53:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4006c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:53:41 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x60}}], 0x2, 0x0) [ 1740.171951] loop4: detected capacity change from 0 to 512 [ 1740.211750] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1740.221770] EXT4-fs (loop4): get root inode failed [ 1740.222916] EXT4-fs (loop4): mount failed [ 1740.246480] loop4: detected capacity change from 0 to 512 [ 1740.266344] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1740.268955] EXT4-fs (loop4): get root inode failed [ 1740.269668] EXT4-fs (loop4): mount failed [ 1740.365736] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1740.367102] misc raw-gadget: fail, usb_gadget_register_driver returned -16 06:53:55 executing program 1: pipe2(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64=r0], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)=ANY=[@ANYBLOB="aecc6df5101bcb68f94ec39c4aae97708e4d7bbbc496f1e387aebcd9ee46a513e518803f0800000000000000000000000000fcff00000000194feaea9fb3ad0a7de2f587b2299e522f9c42f5a2aca67e1de346158d2a0aa5ef169fafa570d35515183d0a012f552a0bdf82fae7e333d781fd21f082b60fe2063cb9ddd97f9d76"], 0x13, 0x1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001480)={&(0x7f00000002c0)={0x11c0, r2, 0x100, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x2, 0x56}}}}, [@NL80211_ATTR_MESH_SETUP={0x107c, 0x70, [@NL80211_MESH_SETUP_IE={0x37, 0x3, "853d3ec416b8b78879a74415939f9188b117f467d22896ce5d2e174a780b7c7dfae8ba15eae5d67d696924b2b09d8fde9325d3"}, @NL80211_MESH_SETUP_IE={0x23, 0x3, "7a1676c5c1cfe1f3c330779f9e350331437b0b3a93217cb99f29fa6768fe44"}, @NL80211_MESH_SETUP_USERSPACE_MPM={0x4}, @NL80211_MESH_SETUP_IE={0x1004, 0x3, "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"}, @NL80211_MESH_SETUP_USERSPACE_AUTH={0x4}, @NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5}, @NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5}]}, @NL80211_ATTR_MESH_SETUP={0x4}, @NL80211_ATTR_MESH_SETUP={0x118, 0x70, [@NL80211_MESH_SETUP_AUTH_PROTOCOL={0x5, 0x8, 0x20}, @NL80211_MESH_SETUP_IE={0xe2, 0x3, "36e34161f2eb227167d40213f11794d476d5e5bd1755044e2ab7c27a4c53c66527d6e6bf4c4ead34afc655ed9b958e5e43d7b9335f064407770c97b9b495a7c37106f5646a6404af8fbf6222fa53c9acdfa1f022e6f20c986629b85f977238c215c8269ba11fd589dcf147bd7d2672458cf9608f7f0c7368fa660aca6f6f3452b937ba419edc7550c9da54b3a2a7df34c9ca98c481c8963452f2b863ba4611d7785b15292b76e77588ce1431f85b2f55f43d16eae9bae67ad331cef8ec8d8700158a88a0c87e0a5ae4b3f09f74bab7c73cd39120c55316b3458fc388043d"}, @NL80211_MESH_SETUP_USERSPACE_AUTH={0x4}, @NL80211_MESH_SETUP_ENABLE_VENDOR_METRIC={0x5}, @NL80211_MESH_SETUP_ENABLE_VENDOR_METRIC={0x5, 0x2, 0x1}, @NL80211_MESH_SETUP_ENABLE_VENDOR_PATH_SEL={0x5, 0x1, 0x1}, @NL80211_MESH_SETUP_AUTH_PROTOCOL={0x5}, @NL80211_MESH_SETUP_USERSPACE_MPM={0x4}]}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x800}]}, 0x11c0}, 0x1, 0x0, 0x0, 0x20000004}, 0x8100) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f00000001c0)={'tunl0\x00', @remote}) 06:53:55 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00030000"], 0x13, 0x1) 06:53:55 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[], 0x13, 0x0) 06:53:55 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x85}, 0x8c0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:55 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b000000000000000000"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:55 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000200)=ANY=[@ANYBLOB="eac7a33eedb460c6760e55eb52395492"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40074, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:53:55 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x289}}], 0x2, 0x0) 06:53:55 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)=ANY=[@ANYBLOB="1f6237b879d8f5f9d04ee480014b27e453a79553fe87b70ccabe59ee4b2b6f9601ebda1c89363a7d75bf82b0438ba53f222e72b33981d967297db0d1d4b0ed4d673387f130977fed81a113ef9b2172da69f69a4a737aa9467bffe27119906382bfb809dc08aebc0761e08ddda36b4cc3919e7dc8f0cd63a6c4a3f81465d0a7c2450706bf1fbf448b3f57623dcf6dcc0dc700e117e819b31e7cbcbefa4055fc36321a7dd2a888d2b72900ce47e39303e0f4b075dbf17b035e6395349d1f07b437969269038d18c2de267ce612a8b328dc941a32afeda8bdc41beeb579a647966536"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1754.216838] loop4: detected capacity change from 0 to 512 [ 1754.238841] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1754.246699] EXT4-fs (loop4): get root inode failed [ 1754.247069] EXT4-fs (loop4): mount failed [ 1754.282299] loop4: detected capacity change from 0 to 512 06:53:55 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b21030000"], 0x13, 0x1) 06:53:55 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x543}}], 0x2, 0x0) 06:53:55 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f29e7d239ceb01d27bc3e470332f3053000"]) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xfffffd5a, &(0x7f00000000c0)={&(0x7f0000000200)={0x68, 0x0, 0x800, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x4, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x24040000}, 0x20040000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040e29db073b"], 0x13, 0x0) [ 1754.309622] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1754.311396] EXT4-fs (loop4): get root inode failed [ 1754.311787] EXT4-fs (loop4): mount failed 06:53:55 executing program 1: pipe2(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0xfffffffffffff800, 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYRES16=r1], 0x13, 0x1) 06:53:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4007a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:53:56 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00140000"], 0x13, 0x1) 06:53:56 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x5dc}}], 0x2, 0x0) [ 1754.447059] loop4: detected capacity change from 0 to 512 06:53:56 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xc0120, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40a01}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000001c0)={0x2, 0x80, 0x9, 0x4, 0x1, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x5, 0x1}, 0x1040, 0x3, 0xa76, 0xe, 0x4000000000000000, 0x3224, 0x0, 0x0, 0xd5, 0x0, 0xe4a}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) mount$9p_unix(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x10, &(0x7f0000000300)={'trans=unix,', {[{@noextend}, {@version_u}, {@dfltuid}], [{@uid_lt={'uid<', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}, {@appraise}, {@smackfstransmute={'smackfstransmute', 0x3d, 'security.evm\x00'}}, {@obj_user}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@smackfsdef}, {@euid_eq={'euid', 0x3d, r4}}]}}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1754.474899] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1754.476404] EXT4-fs (loop4): get root inode failed [ 1754.476764] EXT4-fs (loop4): mount failed [ 1754.491471] loop4: detected capacity change from 0 to 512 06:53:56 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b000000000000000000"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:53:56 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x2448, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 1754.523207] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1754.527235] EXT4-fs (loop4): get root inode failed [ 1754.527605] EXT4-fs (loop4): mount failed 06:53:56 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000400)=[{&(0x7f00000001c0)="39fad5efc7a5be85875fcd0e6787e1b3ce71764a52f56c146a7562353f0f559190c31413395f40399b8e3ea2af53ccda20eb14ae5d97100212f96250b6d9b4665d540ca1f431511a90ee870be31ef23aa956cc069925dbd9103427ddda011868279a55c3dcf5b199f73cd3bcfe7930b11f9bccb44f9287aea496d47cbea94f574e1da71f2c65455cf0da541b6ba83bb594c0abefea300c42b4333f41cd9af440ece98fe882afe10498dd8e856f13", 0xae}, {&(0x7f0000000280)="6a9692435d4b3ff05c5736b699bd21e86dbcfc2baaef7b1d6b1062b0d492a63c73995c2809729b39ab3aa57dd933250afc462bc234b64b04d23f2a48ba333cfeb3fe513d56c8d817e52fcd6ac8b4a570e90147fcbc7f0f7c93727e17f0f79b1652b3bd9a18a58f5342144e87436b2e53f3afde00462908428eeea8ce3202bbe5a1b3b4eebc9a3227", 0x88}, {&(0x7f0000000340)="5b49a29a4def567bdc65a90ccb192f67d61565d111862631e58dd2f4e35b0d28890469cc5c81e79fc87223f16d5e548914937af05d206ba4a75cf7fdc0dc8f7b525178b8682c658a0e3eddb31e3a98c057db338592cb9267a1dca9d0022ffc", 0x5f}, {&(0x7f00000003c0)="e2bc8ffce929a0bc05bd2f019a73c8bfcb8cc0da6a30fc724b026a9cda01", 0x1e}], 0x4, 0xa) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1754.540471] 9pnet_fd: p9_fd_create_unix (10009): problem connecting socket: ./file1: -2 06:53:56 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00200000"], 0x13, 0x1) [ 1754.597915] 9pnet_fd: p9_fd_create_unix (10016): problem connecting socket: ./file1: -2 06:54:09 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="040ebddb423bdc9bbf7afdf8d60a1a07e8714f3f4cf1c9a70377f590e45aab8edf41d8b34c15337ad8"], 0x13, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)='./file0\x00', r1) 06:54:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400fe, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:54:09 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b03210000"], 0x13, 0x1) 06:54:09 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x5, 0xc4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x48028}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:09 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x5e0}}], 0x2, 0x0) 06:54:09 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x600100, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) kcmp(0xffffffffffffffff, r1, 0x5, r2, r3) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {r2}}, './file0\x00'}) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000200)={'wg0\x00', 0x9c2}) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:54:09 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b000000000000000000"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:09 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) readv(r1, &(0x7f0000001700)=[{&(0x7f00000001c0)=""/56, 0x38}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000240)=""/186, 0xba}, {&(0x7f0000000300)=""/211, 0xd3}, {&(0x7f0000000400)=""/44, 0x2c}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000540)=""/24, 0x18}, {&(0x7f0000001600)=""/254, 0xfe}], 0x9) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000001c00)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001800)={0x3b0, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xdc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3f, @rand_addr=' \x01\x00', 0xffffff01}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg1\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK={0x58, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc35}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x98, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc22}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7a00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56c7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0001}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_SOCK={0x48, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3be}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xc4b}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5d}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4b}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffe00}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0xa0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff9079}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaa4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0x3b0}, 0x1, 0x0, 0x0, 0x8000}, 0x40) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000001c40)='./file0\x00', 0x800, 0x0) 06:54:09 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00f00000"], 0x13, 0x1) [ 1767.440101] loop4: detected capacity change from 0 to 512 06:54:09 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='s|Z0'], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x0) [ 1767.473219] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1767.485055] EXT4-fs (loop4): get root inode failed [ 1767.485905] EXT4-fs (loop4): mount failed 06:54:09 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000ab29492c9fb85a3be3ace78e54f64a54ea2b19af951c5748e0725a2ba84d0443c4cbea"], 0x4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {r2}}, './file1\x00'}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1767.531670] loop4: detected capacity change from 0 to 512 [ 1767.550306] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1767.551772] EXT4-fs (loop4): get root inode failed [ 1767.552122] EXT4-fs (loop4): mount failed 06:54:09 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x23, 0x7, 0x40, 0x0, 0x100, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x1, 0x7fff}, 0x1200, 0x80000000, 0x6, 0x0, 0x7, 0x0, 0xa0e5, 0x0, 0x1ff, 0x0, 0xec5}, 0x0, 0xf, r1, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:09 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/17], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40299, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:54:09 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x608}}], 0x2, 0x0) 06:54:09 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="048ebddb423b"], 0x13, 0x0) 06:54:09 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/17], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1767.678659] loop4: detected capacity change from 0 to 513 [ 1767.720825] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1767.725266] EXT4-fs (loop4): get root inode failed [ 1767.725969] EXT4-fs (loop4): mount failed 06:54:22 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r2, 0x10, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040081}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:22 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b01ff0000"], 0x13, 0x1) 06:54:22 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x689}}], 0x2, 0x0) 06:54:22 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000001240)=ANY=[@ANYBLOB="6fb6f41233aad67823d5da357ff4352252b31f14ff4bb91116f32cc1f8c79f467b9b1490e5e092da29d4d3cfe26996261fd6d3c3a8e0891a4b9d113539c86d01b05ca08ba265ce76bf0000000000000000000037"], 0x13, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r3 = syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x8000, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="2cee52e601bed0ff25c6efd5be0d9563f2bfad0e9b39fa55336fc07aba38e89dc134d4cf57113750a929a1344eaff1943f85e6e68614367f016c4de4025f6b9b160ab89c040785f13522efc71ea34015a189999a0c10b119b430de9f46d30c895476c2385b1635759463138b698efc5da9a03df467dc75d611bafee6792d603ab35e", 0x82, 0x7}], 0x800012, &(0x7f00000003c0)={[{@utf8no}, {@fat=@debug}, {@uni_xlate}], [{@obj_role}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@measure}, {@smackfsroot={'smackfsroot', 0x3d, 'syz0'}}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r4, 0x0, r6, 0x0, 0x4, 0x0) splice(r5, &(0x7f00000012c0)=0x8, r1, &(0x7f0000001300)=0x3ff, 0x7fff, 0x5) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000002, 0x2010, r4, 0x8) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000440)=[r2, r3], 0x2) 06:54:22 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/17], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:22 executing program 1: read(0xffffffffffffffff, &(0x7f00000001c0)=""/75, 0x4b) pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000000)) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) syz_open_dev$vcsa(&(0x7f0000000080), 0x4, 0x105000) 06:54:22 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000780)={'sit0\x00', &(0x7f0000000740)=@ethtool_channels={0x3d, 0x5, 0x3, 0xb81, 0x10000, 0x68, 0x5, 0x1ff, 0x200}}) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0xbb, 0x7, &(0x7f0000000600)=[{&(0x7f0000000200)="a1e718fd8ba61baefa852934551e918558e7c3773102daf38aa7306614b6b5c7a2a7492e8bf7ab37fdff55a723b128ed1f686ef6e3b4b9a0b909195df6bbe31797eefbcc5894fabc", 0x48, 0x8}, {&(0x7f0000000280)="5929c943a5c68992ad40043858abd7095675707137cc8872f3182773eeaab511d45fc0ac2655f105c8dee595b190078c00e5fe030f216f8ca670c30be330b4d0518a851164499f27ac323d950b7d3c79dade3555d3c50a923bdd26aed02b7c99c6fb0c445a873943813a5bec0e6e8166ef1feea839b0b8a15ba5b319a7fdadfa742a5f63a2234d22f9a130de6f24d539dd17b47135d179fe9099395f65b872", 0x9f, 0x4}, {&(0x7f0000000340)="031d540c1ffe1995796240ba5abd1973a71ee1fe86396610ec751d8f835caae8456f757516107c4ae88f41254e7dea9c724a8b4d6ed0924753bb0b5c3b20599d95ddf9c3fad5ae749da98d70d4ce0dd811a0f65b52ed0ac856469f8ae5d44987e7fcd317855a1a1153294bc926128c38c4dcacb3fd890b65dfab1a53efbd8eceec1aeeef49f137df0aea74acdb9f60d36043b07ba79d5d81bde0a9c8c941573057874d20673e447ef6", 0xa9, 0xb9e}, {&(0x7f00000000c0)="86338019ab843918dae8a0d849776eab3c703740412a9ff6d9221f99c5b87f80445c53e848598f9275817e45703ced1a5ac16175c4ba", 0x36, 0x27d8}, {&(0x7f0000000400)="85cffa0f382935565ca5c21a8a4d0090559319d2cc475c9e3ad937b399fc666d0e2686d9dd5be3ee3a0d7b91ed823960f386f7c3fa679a9eec53fbd9c145d47ff11266b361d0ee11f1ecf61d369f07e549d95e46b8772765b74ee585a572bef42d5fb7a42a7c46ee2249df22cae68f575191125eb69ee886a3e260efa395f65841baaf38a3d881338d9e438f12b86753e3639ec11aa74ec29d1d4985792317ed44f115e908f80add1bd182148c01fcba9405941864d57797c3959aec2a132f2acb3c39d71d50a8bdee79b71611e1a83bbe8b2cf1b5daae894b1f6d61bc6a86d3af5fe1f552ffffb68649758bcb815e66da0ee3f0d4", 0xf5, 0xfff}, {&(0x7f0000000500)="5ede65a5922a950bf07aab7fbfeea01d31da8b914d368912076bac2f6acdadc62b263f25bf956b924269e3946070f71a36c15a1c94083fcc7ad29774be34324928ed799b84a4bd6f91f9028e7749fcbae7055d60373ced3fe7a28226be6f1cc7384145af91d1cfa1b141c7f2f8e9a2fa7eddf247f530076b37a1ab3bbd8640ace51690b8a1fed4d42e6be24dcba55e180b0d69be0498c7e4fed0b1773ab5d99e06d52476aaf17c260389e2f6bbde6373e711c3f365b3929569dfab28aa94b5835d4fa79fcdea5f045f5d6c0c1d81e8fd2bb585e54d8c006919cfcf7ab17cf3be94a5", 0xe2, 0x9}, {&(0x7f0000000140)="9e46daed597baa59cfc5e63eece0c7abda56e61cd6cf7bfc0504378fa1d07e223ed2d0c1f73b4a03c61caa2388a8", 0x2e, 0x592}], 0x60040, &(0x7f00000007c0)={[{@resuid={'resuid', 0x3d, 0xee00}}], [{@uid_eq={'uid', 0x3d, r2}}, {@obj_type={'obj_type', 0x3d, 'uid'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x20}}]}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) llistxattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000840)=""/206, 0xce) 06:54:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4029c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1781.036037] loop4: detected capacity change from 0 to 513 [ 1781.041804] loop7: detected capacity change from 0 to 39 [ 1781.054710] loop7: detected capacity change from 0 to 39 [ 1781.070665] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:54:22 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000800"], 0x13, 0x1) [ 1781.075407] EXT4-fs (loop4): get root inode failed [ 1781.075761] EXT4-fs (loop4): mount failed [ 1781.088658] loop4: detected capacity change from 0 to 513 [ 1781.097958] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1781.099340] EXT4-fs (loop4): get root inode failed [ 1781.099700] EXT4-fs (loop4): mount failed 06:54:22 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x3) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40a) [ 1781.147596] loop2: detected capacity change from 0 to 64 [ 1781.274536] FAT-fs (loop2): Unrecognized mount option "obj_role=" or missing value [ 1781.856917] loop2: detected capacity change from 0 to 64 [ 1781.858689] FAT-fs (loop2): Unrecognized mount option "obj_role=" or missing value 06:54:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402db, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:54:38 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)=ANY=[@ANYRESOCT=r0], 0x13, 0x1) 06:54:38 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x806}}], 0x2, 0x0) 06:54:38 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00002000"], 0x13, 0x1) 06:54:38 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x14, 0x0, 0x9, 0x801, 0x0, 0x0, {0x3, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x48d0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x13, 0x0) 06:54:38 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:38 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/18], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:38 executing program 2: r0 = fsopen(&(0x7f00000001c0)='hpfs\x00', 0x0) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000c00)=ANY=[@ANYBLOB='trans=unix,cache=fscache,access=zlient,access=any,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c70726976706f72742c64666cc23f733b0af282746769643d", @ANYRESHEX=r2, @ANYBLOB=',fscontext=staff_u,obj_user=environ\x00,subj_role=environ\x00,euid=', @ANYRESDEC=r3, @ANYBLOB=',measure,\x00']) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000400)='[[:\':[\x00', &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000480)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="2e653000a90c51309f20254b0acf5901e1ed3d6accc68baa97bd1b50db4a4944eb28faa513e7176ef0509576c9e4bfc38a00ed603e42fb6f5aeb647b3bbbd4000000006d49fad5f6fb7767f9647fc009743e2ffbe5432a12ab2326a304ccbb132f25ee5bba323c72200003bc27516e685cc319848ae817542de04c825e4e5c514e76849cd7b9f55590f8f18276ae0b8fb8e1eee27b9c7387bcbe5d8f08c47707567ca1d6051f13b655ff8c487707c71035248632033445c521de16"]) sendmsg(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @broadcast}, 0x1, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000a40)=[{&(0x7f00000006c0)="d44d9023e91bfca62a38d99f29d8bf87243e92190844eb32e4f2b4c0b2d1e837275de20d44bba666b9b7a9513e0c08d7506b0d16bba059b503b95229c427bbda799df87f560c31858a13750120a67d11301764cb23101a8859b0a1635d92f5afd8d512ac9273f1926896aa30247507fbfc9e5e2135e570155b82bc99a9786c9c2e19a1350a26c74fdcb08933da1b527265e80593f7", 0x95}, {&(0x7f0000000780)="644040f1186304202b3a4d92947c185aee261b5516eddc74a0c3df99b6e929b50a7b571f09092ad63094073fc62797b0cbe06a07d62fcc14f9fc5327a00ea9668b0470c9505ae15f634c32c181cabf87b7cf8189de528c90b593", 0x5a}, {&(0x7f0000000800)="a33d967a3537cc919377474b71038da19527feedfec1e39a15dc8d0f5035f27f673637ef0747d694e4b1e15e9d3642a639312345c61fb08440b12bece44d2decfec74e46be4d3d34f0ab793ac1783c19c64965073359724f10328b347a7fe6bcc1d9f81135aa321d7081c75b75028cc6c82401a0c7a1f1f80d233727634cdc9052377c9356f6e87320e561e6601999dc0a835c593d96c33ecd2050155ded0f7e05fbbd4b5417", 0xa6}, {&(0x7f00000008c0)="dc5ce6a31701793a3923057766e3f6e41f174f5129a94cc6b98a7bef29d87c675b44d063dc63239e017de2eac8da7d57657b25a718a317801ced41c3d1ed7d843a5bcddaea36a23c8230224a6200d115d2e9b5dfed08c7a1dd75ddb75bc901e51a9dc5da1a6213dae803b7594c928a9cf1b5e1215ad3e25e56d050", 0x7b}, {&(0x7f0000000940)="7e302d1274a699a7afd579629095042019746359253ddc623c03cb0640d01f44a97df1892cd960f644dbacdabcd5f050", 0x30}, {&(0x7f0000000980)="3382502bc46bceffea11e41a5153e9a506d9c49d6801b8680430ebd5d30bddf7a606ed8f0bd1b1fa08f3548753c3e1444a950a70909737b8f0333ca835f57cf736cdf477d53935c08616ab675beafaa899ee0edd431cb08b86d1c0563729148d0d734b6f3b1193c392d4a6dbc476eb94f7ec62fdbc1d3e59212025204e4d846258e32f85124993b45c009f847152eaf49494c6dc22c9dfd0f99d", 0x9a}], 0x6, &(0x7f0000000ac0)=[{0xf8, 0x112, 0xf9, "71633c7a64d535fd2403718284dffccc9cf80c71b6dd59ba60a473d04b3c90f27e0f79569bb4732149e86121fb7a0f21b1bac4d85f4a45260ec8ce39b6583b0566015e557bfad3c7a557ff5e2cfb8b83d5c15afd97350da61c5be906998172270ff3a281e4ec89e5a586ddcc5993ccede9d3c7b5663077b5560eb61dcf38f0570b78c26ab8bdbf56433d2f354402d440ce12040c94740d312ee3375d8e5e85feaf817adc25a0f531f74630919c839bc7ba6f1eb76c1c86dd146df49905f5a99cbc7bf373a8abdce88376d73504359463597597d4d29923bc5b393e8e0e54baec78170e936e33"}], 0xf8}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000300)=ANY=[@ANYBLOB="4d8e28e52cdd445cd4e71c7fd79c08d746325f83483d"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:38 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x2800a, &(0x7f0000000280)={'trans=unix,', {[{@privport}, {@access_any}, {@privport}, {@access_user}, {@aname={'aname', 0x3d, '{\\[/'}}, {@cache_mmap}, {@access_any}], [{@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@appraise_type}, {@measure}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsroot={'smackfsroot', 0x3d, 'security.evm\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fowner_eq}]}}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000100)=""/65, 0x41}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1796.478702] loop4: detected capacity change from 0 to 513 06:54:38 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xe00}}], 0x2, 0x0) [ 1796.513444] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1796.517913] EXT4-fs (loop4): get root inode failed [ 1796.518960] EXT4-fs (loop4): mount failed 06:54:38 executing program 1: pipe2(0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:54:38 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bfffff000"], 0x13, 0x1) [ 1796.582519] loop4: detected capacity change from 0 to 513 [ 1796.604640] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1796.628691] EXT4-fs (loop4): get root inode failed [ 1796.629111] EXT4-fs (loop4): mount failed 06:54:38 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x38}}}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20004004}, 0x10000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:54:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:54:38 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000001"], 0x13, 0x1) 06:54:38 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/18], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:38 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000002"], 0x13, 0x1) 06:54:38 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, &(0x7f00000001c0)=0x17071f41, 0x9e) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r3, 0x400454ce, 0x0) dup3(r2, r3, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1796.846681] loop4: detected capacity change from 0 to 513 06:54:38 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x1100}}], 0x2, 0x0) [ 1796.869850] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1796.875308] EXT4-fs (loop4): get root inode failed [ 1796.875710] EXT4-fs (loop4): mount failed [ 1796.888777] loop4: detected capacity change from 0 to 513 06:54:38 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file1\x00', &(0x7f0000000180), &(0x7f00000000c0)=ANY=[], 0x13, 0x0) [ 1796.906764] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1796.909356] EXT4-fs (loop4): get root inode failed [ 1796.909738] EXT4-fs (loop4): mount failed 06:54:38 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/18], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:38 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:38 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x2f89}}], 0x2, 0x0) 06:54:52 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="737939d7ec37aa6c74808eaa83490c53d07a30"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/38, 0x26}, {&(0x7f0000000240)=""/29, 0x1d}, {&(0x7f00000001c0)=""/128, 0x80}], 0x3) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:54:52 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x3580}}], 0x2, 0x0) 06:54:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40410, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1810.922720] loop4: detected capacity change from 0 to 514 06:54:52 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000003"], 0x13, 0x1) 06:54:52 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x4000011) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r2, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r3, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xab, 0x55}}}}, [@NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x9}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x1) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r0) sendmsg$NL80211_CMD_GET_KEY(r2, &(0x7f0000000640)={&(0x7f0000000480), 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0x4c, r5, 0x20, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x1, 0xf}}}}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x3}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "d5a2ac01948264f806dfb12f4b"}, @NL80211_ATTR_KEY_IDX={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000127bd5300fcdbdf25650000000c009900020000002f00008808000200010000000400038008000100000000000800010008000000"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000200)=ANY=[@ANYBLOB="6518e0440816c9cc98308b01fd5e1bc41a8f621c773db449cb7f845ea91801d800"], 0x13, 0x1) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r6, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x20, r4, 0x300, 0x70bd2b, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x40}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 06:54:52 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:52 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x100, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x2, 0x44}}}}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}]}, 0x28}, 0x1, 0x0, 0x0, 0x4090}, 0x40008d0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r5 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r4, 0x0, r5, 0x0, 0x4, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), r0) sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r6, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x44814) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:54:52 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1810.948061] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1810.949426] EXT4-fs (loop4): get root inode failed [ 1810.949813] EXT4-fs (loop4): mount failed [ 1810.971933] loop4: detected capacity change from 0 to 514 06:54:52 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000004"], 0x13, 0x1) [ 1810.977404] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1810.980349] EXT4-fs (loop4): get root inode failed [ 1810.980740] EXT4-fs (loop4): mount failed 06:54:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x404e5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:54:52 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x4305}}], 0x2, 0x0) 06:54:52 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:54:52 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r0, 0x10, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xd2, 0xf}}}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0xd2f8}]}, 0x28}, 0x1, 0x0, 0x0, 0x844}, 0x20000000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1811.082031] loop4: detected capacity change from 0 to 514 06:54:52 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73016b8d832c305baddd99e4cd7bf3824a3a196cd27112109fea706c0bd9d36bdc1eafb50c1d2f840e98236963c7bbfd8df2d40f6383c0bd3653a5b9acbef49362a6823c"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x37f, 0x40002) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r2, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r4}, 0x80, 0x0}}], 0x2, 0x0) sendto$packet(r1, &(0x7f0000000280)="2888516e56fc4212dfaafd95f8fc21f08608908c55ce392f572534725d85d157c2311e144d2994721330737cbb6e2c390636549e93f568dbc52d85e49dd1a61e2fb99a150a31e2f65aeb90179adf0e8fcef9b3f5625613b0b61b33f1be3f6bab0c", 0x61, 0x404c8c0, &(0x7f0000000300)={0x11, 0x2, r4, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x14) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0), 0x80, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0xc0, 0xfa, 0x48, 0x2, 0x0, 0x2, 0x2, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80, 0x4, @perf_config_ext={0x3, 0x3dd}, 0x10200, 0x101, 0xf57, 0x1, 0x6, 0x1, 0x4, 0x0, 0x3, 0x0, 0x401}, r5, 0x8, r6, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f00000001c0)={@id={0x2, 0x0, @a}}) 06:54:52 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000010"], 0x13, 0x1) [ 1811.108811] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1811.112540] EXT4-fs (loop4): get root inode failed [ 1811.112916] EXT4-fs (loop4): mount failed 06:54:52 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x4788}}], 0x2, 0x0) 06:54:53 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="73797a302a2a2ff9b65156a78dd2d805b29ef3d403322c14a9d2e06f7c1a6a5baa9eb9de70fd1705da393eb0c7b2c4117dc55cfdd62dc55f4ccb216e2f23c2ffe3e7d58e3645daca42509bef32b790beb364f3b84d7c1f6f285e57714af44cc1eb57284fbcffeaf89a28c7916066a2bd1e2a1e0c5ea469a8456830b3a7b1fa59f288fc477b2566495004c7d7b2f5a85060ccb63915c19c1c6d3ac0ed9bad943786b306f276"], 0x4) write(0xffffffffffffffff, &(0x7f00000001c0)="3cc4d629b16fb540e25e7d820df3eafd1e1db672c5b3857e60178b0a1a6c3b8c96e996198098cdc543784492fcfb38dd22ced23b5e93e8bd146a789c1d0b3601ae96288853e53605b31117ba62e6583a8338d3e95b9edf8b96884da81053756e7aab02e4c75aa4be633c7ecfd6dedb989c4e74e221ca1a29e4678630440f0b334653bb98c428d003ada70fa8", 0x8c) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[], 0x13, 0x1) 06:54:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:54:53 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000014"], 0x13, 0x1) 06:54:53 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x4888}}], 0x2, 0x0) 06:54:53 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) 06:54:53 executing program 2: write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1818, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3ff, 0x6, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1811.851535] loop4: detected capacity change from 0 to 514 [ 1811.984990] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1811.992491] EXT4-fs (loop4): get root inode failed [ 1811.993177] EXT4-fs (loop4): mount failed [ 1812.058894] loop4: detected capacity change from 0 to 514 [ 1812.081764] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1812.087735] EXT4-fs (loop4): get root inode failed [ 1812.088415] EXT4-fs (loop4): mount failed 06:55:07 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000280)={"23be3481c9a48b7942a2d3c4305a9f8a", 0x0, r2, {0x3, 0x20}, {0x5, 0xffff18ab}, 0x4, [0x6, 0x3, 0x8, 0x9, 0x9, 0x81, 0xfffffffffffffffe, 0xcd, 0x2, 0x9, 0xffff, 0x6, 0x3ff000000000000, 0x7, 0x4, 0x9]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f00000001c0)={{r1}, r2, 0x10, @unused=[0x6, 0x3, 0x5, 0x5], @devid}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:55:07 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20000010) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000001240)=ANY=[@ANYBLOB="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"], 0x13, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)={'syz0'}, 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r1) sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)={0x48, r4, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000}, 0x800) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) openat(r0, &(0x7f0000000000)='./file0\x00', 0x400000, 0x80) 06:55:07 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x92) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000440)={0x1, 0xab, "e381d89d114ecb8326e6608aa36edd1d5e6235803f2d0e510d537cf3b46136f2795cad14650071f69a2b21b69559d61ec787c546e461911d5436f530186f4d059ca1d6cbd3ea7cb41d8eb5601b445f23538e08d2e748b1f8fcb2093c50dc28acedc553f114458a62285d149c0066670c7150405ebb674bb93798628c9846e26c6382de0427fecba44a3fcceb2d6ae36aeffb4698e1594f5653f8286aebaa159b9246ae443871e75c4e7d9d"}) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000280)={&(0x7f0000000200)=""/91, 0x5b, 0x4, 0x3f}) 06:55:07 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) 06:55:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:55:07 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x74a440) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r5 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r4, 0x0, r5, 0x0, 0x4, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x50, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x415b, 0x42}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x7e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x39}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6b}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x2000080) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000200)={"23d7af9a2f5dbe47e2c4dc162c4977dc", 0x0, 0x0, {0xa2, 0x5}, {0x9, 0x1}, 0xe0d, [0x4ea1, 0x0, 0xdf1, 0x3, 0x8542, 0x8001, 0x8000, 0x2, 0x2, 0x0, 0x7fffffff, 0x3, 0x7, 0x80000000, 0x9, 0xffffffff]}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000600)={0x0, 0x0, 0x1, [0x6, 0xff, 0x6, 0x7, 0x8001], [0xfff, 0x3ba, 0x8, 0x3ff, 0x8001, 0x6, 0xfff, 0x8001, 0x9, 0x7f9, 0x7ee5, 0xd15, 0xf4, 0x100000001, 0x4, 0x401, 0x9, 0xfffffffffffffffd, 0x3, 0x8, 0x8, 0x80000001, 0x6, 0x8, 0x6, 0x6f, 0x3dfd, 0x7f, 0xbc, 0x4, 0x6, 0x72, 0x1f, 0x7f, 0x7fffffff, 0x61f, 0x2, 0x7, 0x53e, 0x6, 0xffffffff, 0x4, 0xfffffffffffff001, 0x3ff, 0x57, 0xffffffff, 0x3, 0x10001, 0x0, 0x8, 0x1, 0x8001, 0x0, 0x100000000, 0x8, 0x8, 0x10000, 0x6, 0x7, 0x6000, 0x7fffffff, 0x1, 0x4, 0x9, 0x7fffffff, 0x100, 0x9, 0x5261, 0x9, 0xff, 0x0, 0x1ff, 0x9, 0x4, 0x6, 0x7, 0x0, 0x3ff, 0x4, 0x4, 0x20000000000, 0x3, 0x8, 0x400, 0x68a, 0xffffffffffff70a6, 0x3, 0x3, 0x8, 0xff, 0x100, 0x401, 0x2, 0x5, 0x1ff, 0x7fff, 0x4, 0x1d, 0x8, 0x9, 0xeab1, 0x1, 0x60288e68, 0x5120, 0x9, 0x1, 0x0, 0x100000000, 0x2378, 0x2, 0x18000, 0x9, 0x3ff, 0x0, 0xffffffffffffff7f, 0x6, 0x6, 0x2, 0xfffffffffffffff9, 0x9, 0x2]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f0000000a40)={{r3}, r6, 0x8, @inherit={0x78, &(0x7f0000000300)={0x0, 0x6, 0xfffffffffffffff9, 0x0, {0x10, 0xac, 0x4, 0x0, 0x6}, [0x58d, 0x3f, 0x0, 0xdd, 0x200, 0x2]}}, @devid=r7}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:55:07 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000321"], 0x13, 0x1) 06:55:07 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x5865}}], 0x2, 0x0) [ 1826.112808] loop4: detected capacity change from 0 to 515 [ 1826.142791] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1826.165311] EXT4-fs (loop4): get root inode failed [ 1826.166300] EXT4-fs (loop4): mount failed [ 1826.231707] loop4: detected capacity change from 0 to 515 [ 1826.260080] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1826.264548] EXT4-fs (loop4): get root inode failed [ 1826.265051] EXT4-fs (loop4): mount failed 06:55:21 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0x358e, 0x80000001, 0x1, 0x0, 0x0, [{{r2}}]}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='nyz0'], 0x4) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x40a000, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r3, 0xc0104811, &(0x7f00000002c0)={0x4, 0x0, 0x4516, 0xb8e}) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)=ANY=[@ANYBLOB="71d1c09a40f436bff574a21c76a052a4de76b0c2976b30fa1d15612e30e3c280ffac96df1f0e05f2e5e591e2b01d68c74e5e81e0f8bd0cfb4017399537b165a682c4ccb92e6911d2590cf7ecad44fd8750b6881e4eb4288f805209ddcb5027c3c5fa84e30aa9e263acdf474fad5619e60edce65e317517137652f5"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:55:21 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x258, 0x17, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x15c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xb8, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'ip6gretap0\x00'}, {0x14, 0x1, 'gre0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'macvlan0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'vxcan1\x00'}, {0x14, 0x1, 'geneve0\x00'}, {0x14, 0x1, 'veth1_to_hsr\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x4}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1000}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'virt_wifi0\x00'}, {0x14, 0x1, 'hsr0\x00'}, {0x14, 0x1, 'veth1_to_batadv\x00'}, {0x14, 0x1, 'bridge_slave_1\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'virt_wifi0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK={0xa4, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x80}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'nr0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}, {0x14, 0x1, 'bond_slave_0\x00'}, {0x14, 0x1, 'veth1_to_bond\x00'}, {0x14, 0x1, 'sit0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x258}, 0x1, 0x0, 0x0, 0x2000000}, 0x8890) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="040e3b7d7a5a53da3ddae33adcf6ce4d896c9ec492db558bb08e710ddd3308594834b0256dd7750bf2a4ffd9409cb18ced"], 0x13, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000300)={0x12c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x2a}, {0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xf4, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x12c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000940), r3) sendmsg$IEEE802154_LLSEC_GETPARAMS(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x5c, r5, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0xf8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x4}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0xa5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x15}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) 06:55:21 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)=ANY=[@ANYBLOB="ae775fa72afea24e23dfcd6d3f03a04f1692fffcbe2c45aa3275b7e96f573943e904f76d3c80a7ce7293f344595e489f1009f155d9621367307d78096d1569f69d041ce40a07e5dff7bda37219cc0764baea2bfac72abab82df0070b08d1ab963fedc8cac4b58f4662bd9dca5ba5ece62d8cb7a37163d57325e472e883af90353ed340efbf4b2dc1eff167beaee1b4dc05a1bfa2d044827a97a8a39132bc92b95f537c7e6eb6da7d18e54fe2a2619fc1b8c8d186bc22e49511320b7e92bd2f8444da411b006a5daa8e270235928b8b74a3aa28f550cad3da14"], 0x13, 0x1) 06:55:21 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) 06:55:21 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bffffff8b"], 0x13, 0x1) 06:55:21 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x6000}}], 0x2, 0x0) 06:55:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:55:21 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r1 = syz_mount_image$iso9660(&(0x7f0000001280), &(0x7f00000012c0)='./file0\x00', 0x3, 0x3, &(0x7f0000001440)=[{&(0x7f0000001300)="be086b2f98de74f9f1f17912316f961f8db8a1a411b96edef8d47506f92b9141d3b2b76ed1d5d39fcf5ff4670497b627dc2cc0d0aba8795e286c96e94665e997bde40fe894e1325ea660b21da17eb2f181b448bef5d4576152280666ef57aa6c703995a9027da8510e1faf326b9cc3767998cd88ac5801f4bf324582661a20e6", 0x80, 0xfffffffffffffffe}, {&(0x7f0000001380)="7fe7dded4014a8ec72fe969641a4c04692929cc993656e5c6bde459280dd4dc3c87efeae97d52b0fae39f551c00628ad17fdb1bede2c25451ef186a25043cdac1c5c39d51f8944c14e39b5494f0cbc42b76735fb", 0x54, 0x6}, {&(0x7f0000001400)="4f636b5ccbc9f2fcdc48a6783214cbd50cde17d81a32", 0x16, 0x5}], 0x0, &(0x7f00000014c0)={[{@unhide}, {@gid}, {@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@check_relaxed}, {@block={'block', 0x3d, 0x400}}, {@nocompress}], [{@appraise_type}, {@audit}, {@subj_role={'subj_role', 0x3d, 'security.evm\x00'}}]}) renameat(r0, &(0x7f0000001240)='./file0\x00', r1, &(0x7f0000001580)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r2, 0x0, r3, 0x0, 0x4, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r5 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r4, 0x0, r5, 0x0, 0x4, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)='./file0\x00', r4) [ 1839.502613] loop4: detected capacity change from 0 to 515 06:55:21 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1839.510241] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1839.517089] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:55:21 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x6488}}], 0x2, 0x0) [ 1839.540763] EXT4-fs (loop4): get root inode failed [ 1839.541411] EXT4-fs (loop4): mount failed [ 1839.544834] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.7'. 06:55:21 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bffffff8c"], 0x13, 0x1) 06:55:21 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0xf6) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 1839.579370] loop4: detected capacity change from 0 to 515 [ 1839.584837] loop3: detected capacity change from 0 to 16383 [ 1839.600521] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1839.603658] EXT4-fs (loop4): get root inode failed [ 1839.604277] EXT4-fs (loop4): mount failed 06:55:21 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=ANY=[@ANYBLOB="fb0dbddb423bd9ea08494ffb7bdf8bc0fa03cd7dca87d2c0a88dc2051fd8dfcb4c366bcc371749ab0663edaedf83cb1389ca97616be25fabfd6f4452fb8c31002d8d7f522190d5bf30b05333243066ec7cfcf7c22bb35916983364e1d86ed8aaf071d193ef5759c84385957b3409a779e32aab208cdba6de82dcfd4c9c44d1a0f9b13de1f8b62c4b71901a61338aa9259bb6e692"], 0x13, 0x0) 06:55:21 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x6558}}], 0x2, 0x0) 06:55:21 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="793a30c54566b52c53347fc3f0ee9743cc713bca11b87a39110fcfeb4ab452a50636fc0336526dc51e58b0dbdd401e425f1fec04515c2a938388c6fc0e953b38cf1146bdefbcf780608fca0d488d7ca999d1d9635c024f82345d0c313dbb42067b6992b5f014955a1d8470ac3a67f3e9352281bf47de53353de97c88f4d5ea936a8544e8b68c0a31e7bc864ed49d4915fb6e3e74233d4e27a22fe3722e094f0b688911d050bdb6f6ed6012f9dcd1a0641e54fde9ce26736c1a83ec8bf721576c2bf9cec9b1d3353121008e6c"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) mount(&(0x7f0000000140)=@nullb, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='ramfs\x00', 0x800810, &(0x7f0000000340)='$-/^+(\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:55:21 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:55:21 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[], 0x13, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/sr0k'], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x802000, &(0x7f0000000140)='#,+-:*,*-l\x00') setxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)=@sha1={0x1, "34ce5a89ef763584fdc9c83dd07addc03fca1dec"}, 0x15, 0x0) 06:55:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:55:21 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bffffffe4"], 0x13, 0x1) [ 1839.795871] loop4: detected capacity change from 0 to 516 06:55:21 executing program 2: pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000300)=ANY=[@ANYBLOB="66089c7c613b97a2f2c7dd2768b38a67b9b24ddaa9afde163bfa5a2ce2cfec40f0fa11b846706d9c28a6e89956e7b07b8bc57bb4a3e1b15ca33ae5106bd0990c21a85387d8110ae0e8e0ddc4d25b1196db279da3a1ebc87dc1cf8f3e5732e778ee106441d885e229c975aa02166dcb25851c74e6106024bb6c7ae11d7ade065bdfb553ea9917b859792903e78c1d0f98b3bfc6c003986bcc6178de4eee55ce6acfa29fe830900b92810eade0f34addcb34aeef8e8c71bcad0a40ed5caedf6c58c98eb80d04f68245eff02b25837826ddc461fab2bd97901048896897acbb42ebd70b63"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1839.816673] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1839.820750] EXT4-fs (loop4): get root inode failed [ 1839.821491] EXT4-fs (loop4): mount failed [ 1840.303536] loop3: detected capacity change from 0 to 16383 06:55:36 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 06:55:36 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4008) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:55:36 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x44000, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:55:36 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0xff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:55:36 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8035}}], 0x2, 0x0) 06:55:36 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) ioctl$CDROMRESET(r0, 0x5312) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:55:36 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bfffffff6"], 0x13, 0x1) 06:55:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40a00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1854.393457] loop4: detected capacity change from 0 to 517 [ 1854.426629] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:55:36 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bfffffffb"], 0x13, 0x1) [ 1854.436822] EXT4-fs (loop4): get root inode failed [ 1854.437619] EXT4-fs (loop4): mount failed [ 1854.492928] loop4: detected capacity change from 0 to 517 [ 1854.529025] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1854.545613] EXT4-fs (loop4): get root inode failed [ 1854.546389] EXT4-fs (loop4): mount failed 06:55:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40b00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:55:50 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8100}}], 0x2, 0x0) 06:55:50 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000280)={&(0x7f00000001c0)=""/159, 0x9f, 0x8001, 0x5}) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:55:50 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bfffffffe"], 0x13, 0x1) 06:55:50 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1c, r0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2840}, 0x840) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:55:50 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00"/19], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 06:55:50 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000001c0)={0x352, 0xffffffff, 0x1f, 0x2085, 0x0, "b0974feb62357d68212c7ed18f0e753ffc5130", 0x3, 0x6}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:55:50 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getuid() setresuid(0x0, r2, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2042, &(0x7f00000006c0)={'trans=unix,', {[{@debug={'debug', 0x3d, 0x6}}, {@version_9p2000}, {@nodevmap}, {@afid={'afid', 0x3d, 0xce1}}, {@dfltuid={'dfltuid', 0x3d, r1}}], [{@uid_lt={'uid<', r2}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRESDEC=0xee01, @ANYBLOB=',privport,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',fscontext=staff_u,obj_user=environ\x00,subj_role=environ\x00,euid=', @ANYRESDEC=0x0, @ANYBLOB=',meassre,\x00']) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r3, 0x400454ce, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r4, 0x400454ce, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000009c0), 0x101000, 0x0) r6 = socket$inet_icmp(0x2, 0x2, 0x1) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="d1562b50329807dd6fdd5d53ff465ca59488d6a6da2009eab0700206e281a1ac497c0024b9c4557188f3c5f9b6aa66507a0d98ef48b003d8a5d682eac7da34e9f119a2c2e519b4e7bc2bed1aa46c82a0a679158527e10ac380bb16679935801b37fbdc0b6fa153b43e7eb11693b0643108788f19f6f0eceacc8eb700567f4ec79bb669b619132db3f650bf29e604975c731eafd2752e2d92d726f2eee5f2bad3a67a3ccf27a63cf8e2055868a074dfd1e040c7062d97ca3ee0731f319b1e80d3", 0xc0}, {&(0x7f0000000480)="d56e0f41595f53fe342ecf4f5d51c5abf92bfb4f9b8925b288b9070b29a830af35ca731ed048bdee", 0x28}], 0x2, &(0x7f0000000a00)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, 0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r1}}}, @rights={{0x30, 0x1, 0x1, [r3, r0, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r6, r7]}}], 0x128, 0x20000000}, 0xc0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) umount2(&(0x7f0000000340)='./file1\x00', 0x4) [ 1868.412006] loop4: detected capacity change from 0 to 517 06:55:50 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYRES64=r1, @ANYRESDEC=r1, @ANYRES64=r0, @ANYBLOB="130286de96757a983d06dc9000295d96939920c85ff4fefa9cf1eed59e30cc8024ec29eddcc37c24c0ea46492639d18f2d9805d9b65eee0c43d2ac7ca8e5fdca16b59f7b5e48f36c2162faf51598696acc5c2139dfcb725a165c69ab17e03e1e07", @ANYRESHEX=r0, @ANYRES32=r1, @ANYRESHEX], 0x13, 0x3) 06:55:50 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8847}}], 0x2, 0x0) [ 1868.448384] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1868.451502] EXT4-fs (loop4): get root inode failed [ 1868.451850] EXT4-fs (loop4): mount failed 06:55:50 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b000001ff"], 0x13, 0x1) [ 1868.476737] loop4: detected capacity change from 0 to 517 [ 1868.489193] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1868.490514] EXT4-fs (loop4): get root inode failed [ 1868.490866] EXT4-fs (loop4): mount failed 06:55:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40cbd, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:55:50 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="060448c0003bcb77412261b054dcda13e3928bdfb4190db78d17b24097c458"], 0x13, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f0000002780)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f00000026c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/162, 0xa2}, {&(0x7f0000001280)=""/226, 0xe2}, {&(0x7f0000001380)=""/234, 0xea}, {&(0x7f0000001480)=""/160, 0xa0}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/199, 0xc7}, {&(0x7f0000002640)=""/113, 0x71}, {&(0x7f0000000140)=""/27, 0x1b}], 0x9}, 0x10000) 06:55:50 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00f0ffff"], 0x13, 0x1) [ 1868.601753] loop4: detected capacity change from 0 to 518 06:55:50 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8848}}], 0x2, 0x0) [ 1868.630114] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1868.631481] EXT4-fs (loop4): get root inode failed [ 1868.631818] EXT4-fs (loop4): mount failed [ 1868.654464] loop4: detected capacity change from 0 to 518 [ 1868.674300] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1868.675682] EXT4-fs (loop4): get root inode failed [ 1868.676029] EXT4-fs (loop4): mount failed 06:55:50 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b8bffffff"], 0x13, 0x1) 06:56:03 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000400)={&(0x7f00000006c0)={0x1270, r2, 0x8, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x3e}, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x4}, @NL80211_ATTR_VENDOR_DATA={0x1004, 0xc5, "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"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0xff69}, @NL80211_ATTR_VENDOR_DATA={0xef, 0xc5, "661ed21806ccf4ff3ce557b84944670c1d08dd47182520a9e6367379bf63512393ab58649cae753875a7ea463082968f61c2397a35e5a8ae2c6d5414270162779bcf5f644476fdd4dca81fe4416abfb3a289d89caa0d1c2229fdead06906fc4efdfc39c4e538c15b7eb47b8db22c71cacb32c41ca4dfa9068b2913c69a242628236781a333c8ddbed166159fa30f835ff93cdf8b23ebdfaa96af016655e80d9325a0f102e1a1f1acdefba176581ac2d1c943073a7cd9578288696ffeb61b8fb278ed3b07a9712d3299cd5db89ec7b8574ed43662ac93e1e920f718f2e9b399eca2f1488d89ed9f40d487de"}, @NL80211_ATTR_VENDOR_DATA={0xf3, 0xc5, "4d462da2563920a6b3986231a4e7af6e91ceb9208ce9967abd090d17eb7210664384d8e81944aee1bd736898fe7a9bcf781d44b3c09e2099f67edbb2790163f968c09d0832835701171b375b492bd7e7a28dafd8d13de6f418e88221562d1cf496bb4ac1dadf7a561604476f49c55dd535fdf006b9939ed95e710fde23d8e42569ed89b6cbe5f7255f7b23ceb8f65340a72e1517e4f68a0f7ad864d0a322ed5322e1b118d1984b937c8a91655adb796e2add452768ea3b730d7cf8a9dedc1f9fe6c10eb489a6360f8d77bb56c5db998e9f41fb1d9aa5ac4cce8631aae035c1ec9edde1c86cb76e9ef4fd76bc10e516"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x9}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x1}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x8d}, @NL80211_ATTR_VENDOR_DATA={0x31, 0xc5, "82c6943f1971b0cfd91e41bd87a1212469bd02e6aa0bfe451d0f905cf835e74f51c7e10ba7abb098c08a675af7"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x4}]}, 0x1270}, 0x1, 0x0, 0x0, 0x4000040}, 0x80) setresuid(0x0, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x400, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000200)="624be9d5bf213b3df363ab0cc8a885c568e39b4472026c1de85db314822817c8b92c0218a6dd9ec2187ac4ec5955e493f67e7b8e90080b75044b05f902a718662f0680e78862a6c7b3fb954b6682e3d79f382390", 0x54, 0xfc}], 0x200000, &(0x7f0000000280)={[{@mpol={'mpol', 0x3d, {'default', '=static', @val={0x3a, [0x2f, 0x2c, 0x7f, 0x3a, 0x16, 0x31]}}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x37]}}, {@mode={'mode', 0x3d, 0x2}}, {@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x52]}}, {@mpol={'mpol', 0x3d, {'default', '=static', @void}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x64, 0x31, 0x39, 0x64, 0x1b, 0x37, 0x66], 0x2d, [0x31, 0x35, 0x31, 0x33], 0x2d, [0x33, 0x30, 0x39, 0x36], 0x2d, [0x31, 0x30, 0x66, 0x37], 0x2d, [0x34, 0x30, 0x64, 0x64, 0x61, 0x61, 0x33, 0x30]}}}, {@appraise}, {@fowner_lt={'fowner<', r0}}, {@dont_hash}, {@audit}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, 'security.evm\x00'}}]}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:56:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40cbe, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:56:03 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8864}}], 0x2, 0x0) 06:56:03 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b8cffffff"], 0x13, 0x1) 06:56:03 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="73797a30e1e9de3e14b3278a47e2605d5f6ea01bd497c886d00b7f80d3f94fc62a8135b71060cec5c48a740b1ab2f2975578586005a64e5e7a6c5a5065c84b72f07acadff07c68dd6100ca243cf409d89770bf16740bfa3be6ee958318dbaba0c687f173446fa6b57ce65163217a5167c8f0eafb7e1a6b4d4e83b51c712b1d5004a1c7b8f6f89ff420799860a8563c36d4aa53cb14c0db0913c2734fb0e2cf6aaf66aea523bd0ee8f581e36299a359de53765a7eb23e3f54b7bab001788644a18d478d32b6f55da17b977b56de0cf571df9b54df702f"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) r2 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x300, 0x14d) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000340)={'bond_slave_1\x00'}) ioctl$TUNSETSNDBUF(r3, 0x400454ce, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x8400, 0x0) writev(r3, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000200)) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000003c0)=ANY=[@ANYBLOB="22bb0d81e56c63b7cf3e62269aa6bf9579600f24a896a746eb422dd335e582bfd3ac5fc137aea7d276f801000000941a0f9095249400624a0acaa19891c4a0bcd98ce6878ea36e3aea0bd90da28b179aafa98e4711f6666b2ed6e4d1b44256abfadf79d01b32586326f3"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) lseek(r4, 0x20, 0x2) 06:56:03 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a30e4b5291f129c347f3760ebaf3bc07ccdf61239c52222cb2eedcb302cb422db35084d33a55b690d04053cc5fc83d8a20e87264ea1ef355e4ec08a63ac16013212208e96b5c47ce218e9d012a0df958441d33f60bcb62e0598b3e4cc55427199030000000000000088823c7a7b68c3e8c906d0730e6b19ae167127125116f7aa4bd5c50aa87e86608ffb3ceaf0d8fed17d6a7016374b6eca8ded707e9c549ba9e7b003fd803b2de6e7837d479c18a14f1f10f2c65c7d3132078a71b5f22ecae5c1b0e01d3003afbe2da0e2af935c011cf0181406ef74df09aacb24c41a98316fd574acaa21231e4a6057c63d990b"], 0x4) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x0, @remote}, &(0x7f0000000440)=0x10, 0x1000) splice(r0, &(0x7f0000000480)=0x800, 0xffffffffffffffff, &(0x7f00000004c0)=0x401, 0x10001, 0x6) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x8, 'veth0_vlan\x00', {'tunl0\x00'}, 0x61}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x3f7, 0x4, 0x70bd28, 0x25dfdbfd, {0x7, 0x7, './file0', './file1'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24004800}, 0x841) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x78, 0x1, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_CLOSE_WAIT={0x8, 0x5, 0x1, 0x0, 0x800}, @CTA_TIMEOUT_TCP_TIME_WAIT={0x8, 0x7, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_SCTP_CLOSED={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0x7bd3}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8914}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}]}, 0x78}, 0x1, 0x0, 0x0, 0x10}, 0x80) 06:56:03 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4008) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:03 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = clone3(0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r2], 0x1}, 0x58) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x40, 0x3, 0x0, 0x0, 0x0, 0x95bc, 0x4108, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x20, 0x1, @perf_config_ext={0x2bd, 0x8000}, 0x2014, 0x2, 0x6, 0x3, 0x900, 0x19, 0x100, 0x0, 0x7}, r2, 0x1, r1, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1881.682467] loop4: detected capacity change from 0 to 518 [ 1881.694484] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1881.696989] EXT4-fs (loop4): get root inode failed [ 1881.697457] EXT4-fs (loop4): mount failed [ 1881.712784] loop4: detected capacity change from 0 to 518 [ 1881.727032] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1881.730210] EXT4-fs (loop4): get root inode failed [ 1881.730561] EXT4-fs (loop4): mount failed [ 1881.737598] loop7: detected capacity change from 0 to 2 [ 1881.749851] tmpfs: Bad value for 'mpol' [ 1881.776617] loop7: detected capacity change from 0 to 2 [ 1881.777348] tmpfs: Bad value for 'mpol' 06:56:03 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423be4ffffff"], 0x13, 0x1) 06:56:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40cbf, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:56:03 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4008) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:03 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8902}}], 0x2, 0x0) 06:56:03 executing program 1: pipe2(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:56:03 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x0) [ 1881.907877] loop4: detected capacity change from 0 to 518 [ 1881.921846] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:56:03 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bf6ffffff"], 0x13, 0x1) [ 1881.944435] EXT4-fs (loop4): get root inode failed [ 1881.945119] EXT4-fs (loop4): mount failed [ 1881.976990] loop4: detected capacity change from 0 to 518 06:56:03 executing program 1: fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) pipe2(0x0, 0x0) r0 = clone3(0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r0], 0x1}, 0x58) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/block', 0x200, 0x174) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f00000000c0)={0xffffffffffffffff, r2, 0x3}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 1882.008470] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1882.028478] EXT4-fs (loop4): get root inode failed [ 1882.030562] EXT4-fs (loop4): mount failed 06:56:15 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bfbffffff"], 0x13, 0x1) 06:56:15 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r1, 0x4bfb, &(0x7f0000000040)) ioctl$TIOCNXCL(r1, 0x540d) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:15 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x13, 0x1) 06:56:15 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)=ANY=[@ANYBLOB="1c6790bbbdd23197fad5a52d98d55f0d72e398358f071b9297b77009231a886f5c6b5a700433043a8544136b208884f7a1ed2a84eafbca892076634f455cf5e3f16a97f2693ed002cb43854de0d965"], 0x13, 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x80, 0x19) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40d00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:56:15 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8906}}], 0x2, 0x0) 06:56:15 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4008) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:15 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) [ 1894.155018] loop4: detected capacity change from 0 to 518 06:56:15 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB='R\x00\x00\x00'], 0x13, 0x0) 06:56:15 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x892f}}], 0x2, 0x0) [ 1894.190616] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1894.198557] EXT4-fs (loop4): get root inode failed [ 1894.199446] EXT4-fs (loop4): mount failed 06:56:15 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pwrite64(r1, &(0x7f0000000200)="8ce6dcb617ebb3ca64b0ec608c9fe6e063a76c958dd9fc098009144d99", 0x1d, 0x7fffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:15 executing program 1: write$tun(0xffffffffffffffff, &(0x7f00000001c0)={@void, @void, @ipv6=@tipc_packet={0x9, 0x6, 'H6.', 0x25c, 0x6, 0x0, @mcast2, @empty, {[@hopopts={0x2c, 0x20, '\x00', [@generic={0x0, 0xff, "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"}]}, @srh={0x88, 0xa, 0x4, 0x5, 0x4, 0x10, 0x0, [@remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x7, 0x0}}, @private1={0xfc, 0x1, '\x00', 0x1}, @empty]}, @fragment={0x3c, 0x0, 0x7, 0x0, 0x0, 0xb, 0x68}], @name_distributor={{0xec, 0x0, 0x0, 0x0, 0x0, 0xa, 0xb, 0x2, 0x200, 0x0, 0x0, 0x2, 0xc58b, 0x3, 0x4e20, 0x4e20, 0x3, 0x1, 0x0, 0x0, 0x1}, [{0x8, 0xac, 0x7f, 0x1f, 0x9, 0x6a, 0xb, 0x2}, {0x81, 0xfff, 0xe59, 0x3, 0x1, 0x4, 0x8, 0xfff}, {0xff, 0x0, 0x9, 0xc157, 0x5, 0x1, 0x9, 0x2}, {0x81, 0x48d, 0x5, 0x3, 0x3ff, 0x146a8836, 0x1, 0x9}, {0x300e, 0x3, 0x6e7, 0x4, 0x8, 0xfffffff8, 0xd, 0xdcbbee9}, {0xe028, 0x74e, 0x5, 0x4, 0x400, 0x8, 0x8, 0x8}, {0x2, 0x74, 0x5, 0xffffffff, 0x4, 0x7, 0x5, 0xffffff9}]}}}}, 0x284) pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@ng={0x4, 0x10, "f289615e0f249e6a5cc8a9532f2ff27df557b5f6"}, 0x16, 0x0) [ 1894.265838] loop4: detected capacity change from 0 to 518 [ 1894.286972] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:56:15 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="73797a303700b66388463f479d1f12c9abfe3b5cd34cc058faa623f0a14d2df739892115325cfae3464b7764e952d068dc3097a6adf44d0c9a00011124cc2c1601c222d9b9ec4441f6103b226d8d9dcb1d4926747700bc"], 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000001840), 0x201, 0x0) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x1000, &(0x7f0000001880)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@nodevmap}, {@afid={'afid', 0x3d, 0x5}}, {@access_client}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@aname}, {@cache_none}, {@fscache}, {@mmap}, {@privport}], [{@appraise_type}, {@fsmagic={'fsmagic', 0x3d, 0x92f}}, {@audit}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) [ 1894.295510] EXT4-fs (loop4): get root inode failed [ 1894.296274] EXT4-fs (loop4): mount failed 06:56:15 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4008) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:56:15 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bfeffffff"], 0x13, 0x1) 06:56:15 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xdc05}}], 0x2, 0x0) 06:56:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1894.467691] loop4: detected capacity change from 0 to 519 [ 1894.478900] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1894.481668] EXT4-fs (loop4): get root inode failed [ 1894.482489] EXT4-fs (loop4): mount failed [ 1894.503122] loop4: detected capacity change from 0 to 519 [ 1894.508319] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1894.510777] EXT4-fs (loop4): get root inode failed [ 1894.511321] EXT4-fs (loop4): mount failed 06:56:29 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r1 = signalfd(r0, &(0x7f0000000000)={[0xe376]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x5b}}, './file0/file0\x00'}) 06:56:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:56:29 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) write(r1, &(0x7f0000000600)="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", 0x1000) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:29 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4008) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:56:29 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, 0x2, 0x3, 0x201, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x9}, @NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x1f}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x80}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x9}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x16}, @NFQA_CFG_MASK={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x11}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000300)=ANY=[@ANYBLOB="7d476a437165a6544541d5516a8e30fd5dccbdb11f3a29fc1ad3c42da9f5bbb2288c3da6455ac719f7b4a4d0843eb0bf7d030e0300000a161dd3b15efa791b908a58bc8bd69ee2e303122f49f78f78dc4ca4028adb2d9443a169c96a01e6aa87e3609f66706cc8977e2048d539d71f706386175fb40008d152f0c2d1da5885243777a692026e5d4f57bef4ca2e5c9b98cd98f95571ab48b947e71231a47ba8162add6c22832cdc455fbe49c054c4854a"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:29 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:56:29 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfdc1, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan4\x00'}) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000300)={0x12c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x2a}, {0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xf4, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x12c}}, 0x0) mount$9p_unix(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x84000, &(0x7f0000000580)={'trans=unix,', {[{@posixacl}, {@nodevmap}, {@cache_loose}], [{@appraise_type}, {@fsname={'fsname', 0x3d, 'NLBL_CIPSOv4\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@context={'context', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'wpan4\x00'}}, {@smackfsfloor}, {@obj_role={'obj_role', 0x3d, 'wpan4\x00'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}]}}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000680), r4) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x224, r2, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x15a24aceb5c7652f}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xa8, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x68}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ced5434}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1c2b6a7d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x47ed2e9a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x75}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc4}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x425d4eab}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x54b2980c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ddb3122}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x56}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7757ce01}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23023cb3}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x124, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x75e65526}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x19}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3f}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77786fe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x659d053e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3d00a557}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4858e86b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x72}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3c}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x38}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x73e4f8af}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2c007467}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b0fca91}]}, {0x4}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x33c9b60f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x325e970b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e0d0da1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x87}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x588d0609}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe9}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xad}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6bbb14ec}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7dd17856}]}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x440c0}, 0x800) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:56:29 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xe005}}], 0x2, 0x0) [ 1907.741070] loop4: detected capacity change from 0 to 520 [ 1907.757237] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1907.760380] EXT4-fs (loop4): get root inode failed [ 1907.760832] EXT4-fs (loop4): mount failed [ 1907.784578] loop4: detected capacity change from 0 to 520 [ 1907.831776] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:56:29 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)={'syz0', "0a28c8ff00000000000000a4f7112142b68ad529c76ac72063e3d380807f2df41e5a8dec31583faf2b90d934e594eee570070e4b10c6e606fd2e5b92481c6e9100"/77}, 0x51) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x1004, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 1907.901899] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.7'. 06:56:29 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4008) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1907.955999] EXT4-fs (loop4): get root inode failed [ 1907.956411] EXT4-fs (loop4): mount failed 06:56:29 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) [ 1908.100821] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.7'. 06:56:29 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)={0x224, r2, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_RULES={0x18, 0x22, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x8000}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}]}]}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_RULES={0x164, 0x22, 0x0, 0x1, [{0x54, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x33}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xfff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x4cae0b7e}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x400}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x7fffffff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x40}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x3}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1ff}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x8}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x347f9beb}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x577}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x3f}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x20}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x33dd}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7fff}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1ff}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x5}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x7f}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x976}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x1}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6866688}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x100}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x5}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x54}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x19}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}, {0x4}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x1}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5a4e1f1e}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x101}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xfff}]}]}, @NL80211_ATTR_REG_RULES={0x88, 0x22, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xdb52}, @NL80211_ATTR_DFS_CAC_TIME={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xaa2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x5}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x3}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x81}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x3}]}, {0x4}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x224}, 0x1, 0x0, 0x0, 0x40000}, 0x44080) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r1) sendmsg$NL80211_CMD_START_P2P_DEVICE(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r3, 0x100, 0x70bd25, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x0, 0x5b}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x4000085}, 0x800) 06:56:29 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)=ANY=[@ANYBLOB="dac802a521cbfdd4d970ca0798e800e9d653a3bd298aba9bfdf2f2371e321a9531f30b20a7d4aa9dedbeb8cff665707980e8efe32d379d3a188c03d69cc3c5816aeb80dc4093694d845484fa7ac31732388bd523e30f"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x50) [ 1908.211999] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 1908.222166] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 06:56:29 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14b4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x292}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20008811) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1014807, &(0x7f0000000200)={'trans=unix,', {[{@noextend}], [{@fowner_lt={'fowner<', r2}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@measure}, {@obj_role={'obj_role', 0x3d, ')./!,/'}}, {@obj_user={'obj_user', 0x3d, 'security.evm\x00'}}]}}) fchown(r1, r2, r3) 06:56:29 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4008) 06:56:29 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r4, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r3}, @val={0xc}}}}, 0x30}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r7, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r6}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xe4, r4, 0x20, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x6, 0x67}}}}, [@NL80211_ATTR_QOS_MAP={0xc, 0xc7, {[], "f0d394a85905fe92"}}, @NL80211_ATTR_QOS_MAP={0x32, 0xc7, {[{0x3f, 0x3}, {0x3f, 0x5}, {0x9, 0x1}, {0x4, 0x4}, {0x4, 0x3}, {0x8}, {0x3}, {0x20, 0x4}, {0x1, 0x1}, {0x6, 0x4}, {0x85, 0x1}, {0xa1}, {0x4, 0x1}, {0x2, 0x2}, {0xc0, 0x5}, {0x8, 0x5}, {0x0, 0x7}, {0x2, 0x1}, {0x3, 0x3}], "3f424357232b0efa"}}, @NL80211_ATTR_QOS_MAP={0x2a, 0xc7, {[{0x96, 0x5}, {0x1, 0x6}, {0x0, 0x6}, {0x6, 0x4}, {0x56, 0x4}, {0x8, 0x4}, {0x0, 0x6}, {0x5, 0x2}, {0x5, 0x4}, {0x7, 0x6}, {0x4, 0x5}, {0xf1, 0x1}, {0x5, 0x1}, {0x4, 0x3}, {0x1f, 0x5}], "2ecb51288fee3898"}}, @NL80211_ATTR_QOS_MAP={0x1c, 0xc7, {[{0x8, 0x7}, {0xb, 0x4}, {0x80, 0x2}, {0x1, 0x2}, {0xfc, 0x6}, {0x8, 0x5}, {0x3, 0x7}, {0x7, 0x1}], "0890ada60417e2a1"}}, @NL80211_ATTR_QOS_MAP={0x26, 0xc7, {[{0x81, 0x1}, {0x6, 0x7}, {0xff, 0x2}, {0x2}, {0x9c, 0x4}, {0x6, 0x4}, {0x89, 0x7}, {}, {0x8, 0x7}, {0x9c, 0x3}, {0x80, 0x5}, {0x80}, {0x69}], "d3ef03d4dd52c9f5"}}, @NL80211_ATTR_QOS_MAP={0xc, 0xc7, {[], "87b20b126fcc95c1"}}]}, 0xe4}, 0x1, 0x0, 0x0, 0x200000c1}, 0x24000010) 06:56:29 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) 06:56:45 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0xfffff13d}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x48000}, 0x200488c0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1815, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000001c0)={r1, 0x80000001, 0x3f}) vmsplice(r2, &(0x7f0000000700)=[{&(0x7f0000000200)="e6c57cb0a15ae2478a060bc73d05aa79b081b8e10e5e2c753e426e1a416e69e125cbdfd5086b81293a0f3ca63ce34b8e547c35ad39917933af8e1d943a9b56d95435c587526a99b660c1cdc924845225a90489783604906f3ff4dd11ab0348579c59c4023b07eda702e7cb81d3", 0x6d}, {&(0x7f0000000280)="9887c89244", 0x5}, {&(0x7f0000000780)="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", 0x1e2}, {&(0x7f00000003c0)="2cae44da4ff01d4d8083713118688e1fc71423ec7026b8c6ef10de82111d8d3c8152edbea701b9dcf0e1a2d38be55588879b189858b8b838fe2c5f750dc83f292c4e6649202a94f05183aab7ce89ff6970dc608b33a560988f1c516f60dab419fd9ee33e88debd8f06754b1e27d5f49bb511dbcf4b0a6ab274b6ccd45c9136cb31e7c382f29703b18612634d8949554b23153fe7af16364ab7691693f87ae6e71eb1466cec7f53b62ebaf62364bcae5e527c56ff45347d0a3642fc1e6a81c62c117dcab04d6a077841d96c8a27e34948fd1ec5831d453d4dd9844d054dee6461803ae479a4f986db830461b0d7e7d9ebbbc509bc51fcb3169f15ba", 0xfb}, {&(0x7f00000004c0)="d3f508629383ef1e470c95f1e484d87880c56995906aa62ec525b802adac40550eca0312a37868a5d4f15768ac8d112fb1c8d8d72b41f36c890c468a98039458ae7a0dd9c0c19ce230ec3c8f9b9e69eadaeb2c74a502a3", 0x57}, {&(0x7f0000000600)="f83f2aad9f990bd3b70be1f812fc37a4b9610e35d3a14132418d9bef3cb1a612f433bbd6ac9565da0f7de556d6c48b93f27e6b7c09709fb1801d0d74fb525f2e9fb20a4e6a0fb61f7c665155cf6a5aae999deec3b2ced61a01f2383e7ef4a26863e670604f69f39ff24b8f884a8745adc0abeb8e4c6460bc2dc194092edbb9a217fc60478223afa0931b9f7f1ecf2f0e6b170b1ba27ac52f95bb82e82444fc646584e5f181f0d997f8fab678b5117d3cfea7e46c5e58d397f26ee3c4ee3bcdd21c9a72d51b5ed5fea8387d4643b2cf2f", 0xd0}], 0x6, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(r2, &(0x7f0000000540)='./file0\x00', 0x42400, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r3, 0x0, r4, 0x0, 0x4, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) inotify_add_watch(r3, &(0x7f0000000980)='./file0\x00', 0x40000020) 06:56:45 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423bffffffff"], 0x13, 0x1) 06:56:45 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x34000}}], 0x2, 0x0) 06:56:45 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$security_ima(r0, &(0x7f00000003c0), &(0x7f0000000380)=@v1={0x2, "bc9d878442ebd9a14e8b"}, 0xb, 0x2) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x20, 0x2, &(0x7f0000000280)=[{&(0x7f0000000200)="1c", 0x1, 0x1}, {&(0x7f0000000240)="d809289db3609af6b778f7f1d26afe4c28fbffcd96edbb0eb598f823f963d5fa65bed4052ecef1c72c908a18d9db93cd75df394d75b321e646", 0x39, 0x7}], 0x8000, &(0x7f00000002c0)={[{@debug}, {@dioread_nolock}, {@nomblk_io_submit}, {@nobarrier}], [{@obj_type={'obj_type', 0x3d, 'syz0'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfshat}]}) open_tree(r1, &(0x7f0000000080)='./file0\x00', 0x800) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:56:45 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="a01fc50400"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x140088, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz0'}, 0x4) openat(r2, &(0x7f0000000140)='./file0\x00', 0x1, 0x145) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x34, r3, 0x1, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x40000) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)={'syz0'}, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r7, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r6}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(r4, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r7, 0x8, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x4000001) 06:56:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41020, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:56:45 executing program 7: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000600)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000340)={{}, 0x0, 0x10, @inherit={0x60, &(0x7f0000000000)={0x1, 0x3, 0x101, 0xfffffffffffffff8, {0x0, 0x3, 0x5b, 0xffffffff, 0x1000}, [0x4, 0x3, 0x800]}}, @devid=r0}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000200)={0xa, 0x2, {0xff80000000, @struct={0x0, 0x5}, 0x0, 0x5, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0x45, @struct={0x3ca, 0xffff0001}, 0xffffffe0, 0xfffff000, [0x5, 0x1, 0x8, 0x100000001, 0x10000, 0x3]}, {0x1, @usage=0x7fffffff, 0x0, 0x9, 0xfffffffffffff800, 0x57, 0x3f, 0x7ff, 0x8, @usage=0x37, 0x8, 0x9, [0x4, 0x0, 0xffff, 0x7fffffff, 0x8, 0x3]}, {0x7fff, @usage, r0, 0x4, 0x4, 0x6c, 0x8, 0x3ff, 0x42, @struct={0x4, 0x3e153dac}, 0x6, 0x800, [0x9, 0x9, 0x40, 0x4, 0x81, 0x1]}, {0x4, 0x4, 0x3}}) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:56:45 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, 0x0, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) [ 1924.192394] loop4: detected capacity change from 0 to 520 [ 1924.198413] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1924.201829] EXT4-fs (loop4): get root inode failed [ 1924.202246] EXT4-fs (loop4): mount failed 06:56:45 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) [ 1924.231825] loop4: detected capacity change from 0 to 520 [ 1924.258981] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:56:45 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb1f3b"], 0x13, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) execve(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000280)='.#&\'\'*\xd7@(&,){!-![#)/&!\x00', &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000340)='*!^*.:\\$\x00', &(0x7f0000000380)='-),)}#}%\x00'], &(0x7f0000000540)=[&(0x7f0000000400)='security.evm\x00', &(0x7f0000000440)='security.evm\x00', &(0x7f0000000480)='@\x00', &(0x7f00000004c0)='-\x00', &(0x7f0000000500)='\x00']) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x50, 0x0, 0x2, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x40}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x50}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x16}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0xb}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6c}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000850}, 0x0) [ 1924.295275] EXT4-fs (loop4): get root inode failed [ 1924.295956] EXT4-fs (loop4): mount failed sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f00000027c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0xae76511e8469627c}, 0xc, &(0x7f0000002780)={&(0x7f0000000600)={0x2148, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xffffffff, 0x3f}}}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x1004, 0xfc, "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"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x800}, @NL80211_ATTR_FILS_ERP_REALM={0x6b, 0xfa, "3def0eaee35553053daa3b124e9972f7c9c7d4fb5fdd3069bec50cb05ff1ce054dd8ac0953850f898dc5f5de742b69df9d6514361f7474cd9f3396840a64fbef0ff2f6cd45934794e12bb0839b44cae532dab093aa386e68828bca55823b96f43bcc641feb63bb"}, @NL80211_ATTR_FILS_ERP_REALM={0x7e, 0xfa, "5bef7f9606d2cee6f6591e98f1d72754782dfb98a680e666365cd1b7e8341f27b67b779a3a772c9721178b76cfc1e61be380cafb120e2413d164ca1d940708ce3584b7b7d48d2402fe91e48d1870ff64dbb7dfb83a975c072ddbf17c8f9500ac0d309bac35f8ed5ab6d4f701c0ab3c483268bca2138b990b4bda"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x11, 0xf9, "2238a82b9ca1fe41f5bd788ed3"}, @NL80211_ATTR_FILS_ERP_REALM={0x1004, 0xfa, "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"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xe, 0xf9, "314ddac157253a6f4b70"}]]}, 0x2148}}, 0x1) 06:56:45 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, 0x0, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) 06:56:45 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x40000}}], 0x2, 0x0) 06:56:45 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="cf83f5f0f3"], 0x13, 0x1) 06:56:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41100, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:56:46 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, 0x0, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) [ 1924.489774] loop4: detected capacity change from 0 to 520 06:56:46 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000e5c4c580989eb5ac007854213f329b0f6bab6d"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 1924.540166] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1924.562569] EXT4-fs (loop4): get root inode failed [ 1924.563238] EXT4-fs (loop4): mount failed 06:56:59 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a30022f73fcc60266d50f04a61ac704530d5a754516bb23afe18f240fdf523be37717a4246f2bc60e5bcd5f25b034d07108e5d5f7f29b6f25570841f01184448aed70ccaf6912219cf8249c719b86f33392b4ad5f"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x412bb, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:56:59 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:56:59 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:56:59 executing program 3: open$dir(&(0x7f00000001c0)='./file1\x00', 0x100, 0xc0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:56:59 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x80000}}], 0x2, 0x0) 06:56:59 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10, &(0x7f0000000000), &(0x7f0000000080)=0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:56:59 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 06:56:59 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) [ 1938.038034] loop4: detected capacity change from 0 to 521 [ 1938.052355] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1938.053859] EXT4-fs (loop4): get root inode failed [ 1938.054243] EXT4-fs (loop4): mount failed 06:56:59 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x400300}}], 0x2, 0x0) [ 1938.088738] loop4: detected capacity change from 0 to 521 [ 1938.110470] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1938.113975] EXT4-fs (loop4): get root inode failed [ 1938.114343] EXT4-fs (loop4): mount failed 06:56:59 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:56:59 executing program 1: pipe2(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000440)=0x2, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000800)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fddbdf250b0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00050000000e0001006e657464657673696d0000000f0002006e657464657673696d30690011000200303030303a30303a31302e300000000008000b000800"/130], 0x88}, 0x1, 0x0, 0x0, 0x8080}, 0x8010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xdc, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x781fa9f2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe06c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x314c}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3909164c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2be0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76d9b1fa}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f15797c}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10000000}, 0x4000) mount(&(0x7f0000000240)=ANY=[@ANYRESOCT=r0], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='hugetlbfs\x00', 0xac00, &(0x7f0000000200)='%\'\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x8001, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000740)="d652c2f89a5eff5bfa382a696a0481", 0xf, 0x6}, {&(0x7f00000008c0)="ef31b840d826", 0x6, 0xacdc}, {&(0x7f0000000900)="e8279b857ddfcdd778f0688d61baff0e4c38ac96afea29c948a039c5fd4ae76b103c66deb9e50d0de31857a73cabd239ae39415c3982426f33841ae2e42641bae4478e1070c28fd372b02cbb85515d55c972df0dbff5861049b28e8ba9c7e8", 0x5f, 0x80000000}, {&(0x7f0000000980)="bb7edf9dc382e31cf758a7b63e33de0f1d4605cf6f010228d2cbede31485ec", 0x1f, 0xbeaa}], 0x4000, &(0x7f0000000a40)={[{@huge_within_size}, {@huge_within_size}, {@mode={'mode', 0x3d, 0x9}}, {@huge_within_size}, {@size={'size', 0x3d, [0x67, 0x74]}}, {@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b]}}, {@huge_advise}, {@gid}, {@nr_blocks={'nr_blocks', 0x3d, [0x25, 0x30, 0x6b, 0x33, 0x25, 0x25, 0x34, 0x2d]}}], [{@uid_lt={'uid<', 0xee00}}, {@audit}, {@obj_role={'obj_role', 0x3d, 'syz0'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@seclabel}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000480)) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES32=r1, @ANYRES32=r0], 0x13, 0x1) 06:56:59 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 06:56:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x412c9, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1938.255789] loop4: detected capacity change from 0 to 521 [ 1938.271968] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1938.273917] EXT4-fs (loop4): get root inode failed [ 1938.274477] EXT4-fs (loop4): mount failed [ 1938.290945] loop4: detected capacity change from 0 to 521 [ 1938.299209] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1938.301309] EXT4-fs (loop4): get root inode failed [ 1938.301835] EXT4-fs (loop4): mount failed 06:57:15 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x1000000}}], 0x2, 0x0) 06:57:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41339, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:57:15 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797ac16447641259712230"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:57:15 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) [ 1954.083996] loop4: detected capacity change from 0 to 521 06:57:15 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:15 executing program 1: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0x1f) pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:57:15 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x22c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8001}]}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x101}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x899}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5fe}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_LINK={0x54, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0xc4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xda}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}]}, 0x22c}, 0x1, 0x0, 0x0, 0x24004044}, 0x8040) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000240)={@desc={0x1, 0x0, @desc2}}) sendto(0xffffffffffffffff, &(0x7f00000001c0)="f97db3ac14e3c571621fb5238e7427afdca5156db856b785710c66188324179ddbc457dab9a4af6af9d3124dab541bce662598db84674e8515c8c7c4c6c2c873a70957e909c51fcc91bdf5d2e93589746b66fb82352dab5d04e7f841ffa000e3b30d9af2752520a072bc23ab05c9de98ba2cfafb9e1a0fb3aa0ae3d1744afe1195cde2511975b4e8cd01a0ac43224afa50efc4bb22896f", 0x97, 0x0, &(0x7f0000000280)=@l2={0x1f, 0x1, @any, 0x400, 0x2}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r3, &(0x7f0000000080)="01", 0x292e9) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r4, 0x200, 0x70bd25, 0x25dfdbff, {}, [@DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x33}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x40}}, 0x8001) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000600), 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0xa8, r4, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@pci={{0x8}, {0x11}}, @pci={{0x8}, {0x11}}, @pci={{0x8}, {0x11}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r5 = fcntl$dupfd(r0, 0x406, r1) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4c, 0x0, 0x0, 0x3, 0x0, 0x81, 0x80040, 0x15, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f2, 0x0, @perf_config_ext={0x7}, 0x0, 0x5, 0x3, 0x4, 0x4, 0x101, 0x4, 0x0, 0x81dd, 0x0, 0x20}, 0x0, 0xf, r5, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1954.102353] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1954.105772] EXT4-fs (loop4): get root inode failed [ 1954.106411] EXT4-fs (loop4): mount failed 06:57:15 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/msg\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp6\x00') [ 1954.132451] loop4: detected capacity change from 0 to 521 [ 1954.145814] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1954.150740] EXT4-fs (loop4): get root inode failed [ 1954.151209] EXT4-fs (loop4): mount failed sendmsg$NL80211_CMD_SET_TID_CONFIG(r4, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000700)={0x14f8, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0x2, 0x7a}}}}, [@NL80211_ATTR_TID_CONFIG={0x2d0, 0x11d, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x3}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xb6}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x40}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x7}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x3}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x8}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xa7}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x8}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x67}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x80}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}]}, {0x8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x6}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x4}]}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}]}, {0x40, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x6}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}]}, {0x18, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x200}]}, {0x1a0, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x190, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x110, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x4f, 0x2, [{0x2, 0x2}, {0x5, 0x1}, {0x1, 0x6}, {0x0, 0x6}, {0x0, 0x6}, {0x2, 0x2}, {0x4, 0x8}, {0x7, 0x5}, {0x3, 0x3}, {0x7, 0x1}, {0x3, 0x8}, {0x5, 0x1}, {0x3, 0x3}, {0x5, 0x4}, {0x5, 0x9}, {0x3, 0x4}, {0x3, 0x6}, {0x1, 0xa}, {0x7}, {0x6, 0x5}, {0x0, 0xa}, {0x2, 0x7}, {0x6, 0x6}, {0x0, 0x4}, {0x1, 0x9}, {0x5, 0x8}, {0x3, 0x1}, {0x0, 0x4}, {0x3, 0x1}, {0x7, 0x3}, {0x4, 0x5}, {0x5, 0x8}, {0x0, 0x9}, {0x0, 0x4}, {0x7, 0x9}, {0x3, 0xa}, {0x3, 0x9}, {0x4, 0x9}, {0x5, 0x6}, {0x0, 0x7}, {0x3, 0x4}, {0x7, 0xa}, {0x0, 0x4}, {}, {0x7, 0x8}, {0x0, 0x3}, {0x6}, {0x6, 0x5}, {0x6, 0x4}, {0x0, 0x3}, {0x0, 0x8}, {0x2}, {0x2, 0x8}, {0x7, 0x5}, {0x0, 0x8}, {0x1}, {0x7, 0xa}, {0x6, 0x9}, {0x5}, {0x0, 0x2}, {0x3, 0x5}, {0x4, 0x3}, {0x2}, {0x7, 0x2}, {0x7, 0x6}, {0x1, 0x4}, {0x3, 0x2}, {0x6, 0x5}, {0x3, 0x2}, {0x2, 0x7}, {0x6, 0x7}, {0x1, 0x9}, {0x7, 0x8}, {0x2, 0x2}, {0x2, 0x8}]}, @NL80211_TXRATE_LEGACY={0x8, 0x1, [0x4, 0x1b, 0x4, 0x9]}, @NL80211_TXRATE_HT={0x3b, 0x2, [{0x2, 0x3}, {0x7, 0x8}, {0x7, 0x6}, {0x5, 0x8}, {0x1, 0x5}, {0x6, 0xa}, {0x7, 0xa}, {0x5}, {0x5, 0x5}, {0x1, 0x7}, {0x4, 0x6}, {0x3, 0x4}, {0x1, 0x2}, {0x7, 0x9}, {0x4, 0x4}, {0x4}, {0x0, 0x6}, {0x7, 0x2}, {0x0, 0xa}, {0x6, 0x6}, {0x0, 0x6}, {0x5, 0x6}, {0x5, 0x1}, {0x2, 0x7}, {0x0, 0x1}, {0x2, 0x3}, {0x5, 0xa}, {0x0, 0x9}, {0x0, 0x4}, {0x2, 0x2}, {0x7, 0x1}, {0x4, 0x3}, {0x7, 0xa}, {0x0, 0x8}, {0x7, 0x9}, {0x0, 0x4}, {0x0, 0x2}, {0x5, 0x5}, {0x4, 0x9}, {0x2, 0x2}, {0x0, 0x5}, {0x1, 0xa}, {0x4, 0x3}, {0x5}, {0x2, 0x1}, {0x4, 0xa}, {0x4, 0x2}, {0x0, 0x8}, {0x2, 0x1}, {0x0, 0x4}, {0x1}, {0x5, 0xa}, {0x3, 0x8}, {0x0, 0x5}, {0x1, 0x6}]}, @NL80211_TXRATE_HT={0x20, 0x2, [{0x0, 0x3}, {0x2, 0x4}, {0x4, 0x2}, {0x3, 0x8}, {0x7, 0x6}, {0x7}, {0x7, 0x3}, {0x6}, {0x2, 0x8}, {0x1, 0xb}, {0x5, 0x9}, {0x0, 0x3}, {0x0, 0x6}, {0x6, 0x3}, {0x6, 0x4}, {0x6}, {0x2, 0x2}, {0x2, 0x5}, {0x4, 0x2}, {0x5, 0x3}, {0x2, 0x7}, {0x4, 0x9}, {0x0, 0x8}, {0x4, 0x7}, {0x2, 0x5}, {0x2, 0x3}, {0x1, 0x9}, {0x0, 0x6}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x8, 0x1, [0x6c, 0x24, 0x6, 0x5]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x40, 0x0, 0x4, 0x2e, 0x0, 0x9, 0x3, 0x5]}}, @NL80211_TXRATE_HT={0x1e, 0x2, [{0x5, 0x4}, {0x5, 0x9}, {0x4}, {0x2, 0x9}, {0x7, 0x9}, {0x0, 0x3}, {0x4, 0x6}, {0x3, 0x5}, {0x0, 0x4}, {0x4, 0x2}, {0x2, 0x3}, {0x5, 0x5}, {0x0, 0x1}, {0x4, 0xa}, {0x1, 0x9}, {0x0, 0x1}, {0x3, 0x3}, {0x7, 0x1}, {0x2, 0x9}, {0x3, 0x7}, {0x1, 0x1}, {0x1, 0xa}, {0x6, 0x7}, {0x1, 0xa}, {0x5, 0x9}, {0x4, 0x8}]}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x6c, 0x18, 0x2e, 0x5, 0x48, 0x5, 0x6c, 0x36, 0x6c, 0x16, 0x6, 0x36, 0x30, 0x60, 0xb]}]}, @NL80211_BAND_6GHZ={0x7c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x2, 0x6, 0x401, 0x800, 0x8, 0x20, 0x214b]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0xffff, 0x8, 0x8, 0xbc8, 0x9, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xffe0, 0x81, 0x0, 0x80a, 0x5, 0x8, 0x5, 0xfff]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x4, 0x3, 0xc, 0x30, 0x6, 0xb, 0x3, 0x16, 0x1b, 0x6, 0x1d, 0x18, 0xc, 0x2, 0xb, 0x1, 0x18, 0x9, 0x4]}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0xc, 0x48, 0x2, 0x24, 0x36, 0x18, 0x1, 0x5, 0x6c, 0x36, 0xc, 0x60, 0x30, 0xc, 0x3, 0x2]}]}]}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x1}]}]}, @NL80211_ATTR_TID_CONFIG={0x268, 0x11d, 0x0, 0x1, [{0x38, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x35}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x69}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x3}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x7fff}]}, {0x204, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x4c}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x1d4, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x88, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x12, 0x1, [0x30, 0x2, 0x1b, 0x4d25aed6f29592e6, 0x10, 0x16, 0x24, 0x6, 0x24, 0x6, 0x1, 0x48, 0x9, 0xb]}, @NL80211_TXRATE_LEGACY={0x18, 0x1, [0x30, 0xb, 0x4c, 0x16, 0x1, 0x4, 0x12, 0xc, 0x30, 0x36, 0x49, 0x12, 0x12, 0xc, 0x60, 0x12, 0x2, 0x16, 0x30, 0x1b]}, @NL80211_TXRATE_HT={0x9, 0x2, [{0x1, 0x8}, {0x0, 0x8}, {0x4, 0x3}, {0x6, 0x3}, {0x0, 0x3}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x9, 0x5, 0x81, 0x81, 0x9, 0x2, 0x1ff]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7c, 0x400, 0x8, 0x8ca0, 0x6, 0x0, 0x2600, 0x7]}}, @NL80211_TXRATE_LEGACY={0x23, 0x1, [0x18, 0x60, 0x12, 0x2, 0xc, 0x18, 0x1b, 0x16, 0xb, 0x18, 0x6c, 0x1b, 0x36, 0x48, 0x48, 0x30, 0x30, 0x12, 0x48, 0x36, 0x1b, 0x2, 0x5, 0x1, 0x5, 0x6c, 0xc, 0x30, 0x30, 0x1b, 0x36]}]}, @NL80211_BAND_6GHZ={0x3c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x21, 0x1, [0x6, 0x3, 0x24, 0x3, 0x36, 0x36, 0x1, 0x0, 0x7, 0x5, 0x36, 0x36, 0x16, 0x12, 0x1b, 0x60, 0x5, 0x2, 0x1, 0x30, 0x48, 0x48, 0x6c, 0x5, 0x6c, 0x1b, 0x48, 0x0, 0x65]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0xb5, 0xff, 0x6, 0xff00, 0x9]}}]}, @NL80211_BAND_6GHZ={0x48, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x1b, 0xb, 0x30, 0x5, 0x5, 0x6, 0x5, 0xb, 0x30, 0x5, 0x5a, 0x6, 0x182bd70329bd3776, 0x24, 0x18, 0x6, 0x1b, 0x0, 0x48, 0x18, 0x1b, 0x3, 0x0, 0x24, 0x1b, 0x12]}, @NL80211_TXRATE_HT={0x22, 0x2, [{0x3, 0x8}, {0x0, 0x9}, {0x7, 0x3}, {}, {0x3, 0x1}, {0x1, 0x6}, {0x1, 0x1}, {0x6, 0x3}, {0x7, 0x9}, {0x3, 0x8}, {0x2, 0x7}, {0x6, 0x6}, {0x5, 0x9}, {0x2, 0x5}, {0x5, 0x7}, {0x1}, {0x7, 0x2}, {0x6}, {0x0, 0x5}, {0x0, 0xa}, {0x2, 0x4}, {0x5}, {0x1, 0x9}, {0x6, 0x9}, {0x5, 0x1}, {0x5, 0x1}, {0x5, 0x7}, {0x0, 0x1}, {0x0, 0xa}, {0x4, 0x4}]}]}, @NL80211_BAND_2GHZ={0xc4, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x8001, 0x4, 0x100, 0x3, 0x4, 0x4]}}, @NL80211_TXRATE_HT={0x44, 0x2, [{0x2, 0x5}, {0x5, 0x4}, {0x6, 0x1}, {0x0, 0x4}, {0x7, 0x5}, {0x5, 0xa}, {0x0, 0x3}, {0x5, 0x7}, {0x6, 0x1}, {0x0, 0x7}, {0x4, 0x3}, {0x4, 0x6}, {0x4, 0x6}, {0x1, 0x9}, {0x0, 0x6}, {0x7, 0x7}, {0x1, 0x1}, {0x4, 0x5}, {0x4}, {0x4, 0x9}, {0x1, 0x2}, {0x6, 0x9}, {0x0, 0x5}, {0x2, 0x9}, {0x7, 0x1}, {0x3, 0x7}, {0x4, 0x1}, {0x7, 0x2}, {0x0, 0xa}, {}, {0x5, 0x1}, {0x2, 0x9}, {0x1, 0x9}, {0x1}, {0x1, 0x3}, {0x0, 0x1}, {0x4, 0x8}, {0x5, 0x5}, {0x4, 0x3}, {0x4, 0x2}, {0x0, 0x2}, {0x0, 0x1}, {}, {0x3, 0x1}, {0x1, 0x8}, {0x4, 0x6}, {0x2, 0x8}, {0x5}, {0x7, 0x9}, {0x0, 0x6}, {0x1, 0x1}, {0x5, 0x7}, {0x1, 0x6}, {0x5, 0x8}, {0x7, 0x3}, {0x0, 0x9}, {0x4, 0x9}, {0x5, 0xa}, {0x4, 0x8}, {0x2, 0x5}, {0x7, 0x4}, {0x7, 0x7}, {0x3, 0x1}, {0x7, 0x6}]}, @NL80211_TXRATE_LEGACY={0x8, 0x1, [0x30, 0x36, 0x12, 0x9]}, @NL80211_TXRATE_HT={0x16, 0x2, [{0x7, 0x7}, {0x4, 0x2}, {0x7}, {0x5, 0x4}, {0x1, 0x6}, {0x1}, {0x3, 0x1}, {0x7, 0xa}, {0x6, 0xa}, {0x1}, {0x6, 0x1}, {0x3, 0x3}, {0x6}, {0x1, 0x9}, {0x4, 0x5}, {0x4, 0x9}, {0x0, 0x2}, {0x7, 0x9}]}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x12, 0x12, 0x6, 0x12, 0xb, 0x5, 0x3, 0x5, 0x2, 0x48, 0x5c, 0x9, 0x5, 0x5, 0x18, 0x27, 0x1b, 0x2, 0x60]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xd05, 0xa687, 0x5, 0x80, 0xfffc, 0x6, 0x8000, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x9, 0x3, 0x6, 0x0, 0xf801, 0x6, 0x1000]}}]}]}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x4c}]}]}, @NL80211_ATTR_TID_CONFIG={0x91c, 0x11d, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xaf}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}]}, {0x178, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xc0}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x15c, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xe4, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x9, 0x2, [{0x3, 0x4}, {0x7, 0x4}, {0x5, 0xa}, {0x4, 0x8}, {0x4, 0x7}]}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x18, 0x18, 0x1, 0x4, 0xe, 0x1, 0x60, 0xc, 0x4, 0xb, 0x6, 0x3, 0x1, 0x60, 0x48, 0x16, 0x16, 0x30, 0x13]}, @NL80211_TXRATE_LEGACY={0x1a, 0x1, [0x1b, 0x24, 0x24, 0x16, 0xc, 0x30, 0x6c, 0x4, 0x6c, 0x30, 0x6, 0x12, 0x60, 0x9, 0x1b, 0x2, 0x9, 0x1d, 0x3, 0x48, 0xb, 0x48]}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x5, 0x12, 0x1, 0x12, 0x16, 0x6, 0x4, 0x36, 0x12, 0x5, 0x9, 0x5, 0xb, 0x60, 0x2, 0x18, 0x30, 0x1, 0x18, 0x12, 0x6c, 0x30, 0x36, 0x0]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x7, 0x7ff, 0x4, 0x6, 0x4, 0x20, 0x4f]}}, @NL80211_TXRATE_HT={0x34, 0x2, [{0x4, 0x7}, {0x4, 0x3}, {0x5, 0x3}, {0x0, 0x9}, {0x4, 0x4}, {0x0, 0x5}, {0x5, 0x4}, {0x1, 0x4}, {0x6, 0x8}, {0x1, 0x5}, {0x1, 0x9}, {0x1, 0x9}, {0x1, 0x7}, {0x2, 0xa}, {0x2, 0x2}, {0x1, 0x8}, {0x1, 0x2}, {0x5, 0x8}, {0x2, 0x9}, {0x4, 0xa}, {0x2, 0x7}, {0x5, 0xa}, {0x0, 0x3}, {0x3, 0x2}, {0x7, 0x7}, {0x3, 0x9}, {0x5, 0x6}, {0x2, 0x7}, {0x7, 0xa}, {0x7, 0x7}, {0x7}, {0x2, 0x3}, {0x3, 0xa}, {}, {0x6, 0x7}, {0x3, 0x1}, {}, {0x0, 0x2}, {0x5, 0xa}, {0x3, 0x4}, {0x5, 0x5}, {0x1, 0xa}, {0x5, 0x1}, {0x1, 0x2}, {0x0, 0x3}, {0x3, 0x7}, {0x7}, {0x0, 0x2}]}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x24, 0x4, 0x1b, 0x3, 0x16, 0x16, 0x2, 0x60, 0x2, 0x24, 0x3, 0x2, 0x28, 0x3, 0x0, 0x4, 0x1b, 0x4, 0x4]}, @NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x6c, 0x1, 0x5, 0x6, 0x9f, 0xb, 0x9, 0x6c, 0x0, 0x24, 0x3, 0x30, 0x1, 0x0, 0x2f, 0x9, 0xb, 0x6, 0xc, 0xc, 0x2, 0x16, 0x18, 0x2, 0x9, 0xb]}]}, @NL80211_BAND_6GHZ={0x30, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xf, 0x1, [0x16, 0x16, 0x5, 0x16, 0x36, 0xbf171acfbca393e5, 0x1, 0xd, 0x6c, 0x9, 0x48]}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x1b, 0x1, 0x9, 0xb, 0x30, 0x36, 0x36, 0x9, 0x1b, 0x6c, 0x30, 0x1, 0x9, 0x4, 0x5, 0x9, 0x12, 0x1, 0x6, 0x36, 0x1]}]}, @NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x11, 0x1, [0x30, 0xc, 0x4, 0x1b, 0x30, 0x1b, 0x18, 0x1, 0x20, 0x36, 0xa132b2d087e713ad, 0x2, 0x4]}]}, @NL80211_BAND_2GHZ={0x2c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x40, 0x1, 0x3f, 0x9, 0x4, 0x9, 0x6]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x397d, 0x6, 0x7, 0x3, 0x485e, 0x7, 0x1]}}]}]}]}, {0x38, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xc4}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x36}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x4}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}]}, {0x6d8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x8001}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xcd}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x3e0, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0xf0, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x18, 0x4, 0x18, 0x36, 0x30, 0x2, 0x6c, 0xc, 0x4, 0x6c, 0x6, 0x9, 0x6, 0x6, 0x2, 0x6, 0x6, 0x16, 0xc, 0x1, 0xb, 0xb, 0x6, 0x18]}, @NL80211_TXRATE_HT={0x45, 0x2, [{0x1, 0x7}, {0x1, 0x6}, {0x5, 0x6}, {0x4}, {0x4, 0x8}, {0x0, 0xa}, {0x2, 0x4}, {0x6, 0x4}, {0x3, 0x8}, {0x1, 0x6}, {0x3, 0x2}, {}, {0x3, 0x5}, {0x5, 0x2}, {0x1, 0x5}, {0x0, 0x1}, {0x0, 0x8}, {0x1}, {0x3, 0x3}, {0x7}, {0x7, 0x6}, {0x7, 0x9}, {0x5, 0x6}, {0x1, 0xa}, {0x3, 0x2}, {0x3}, {0x1, 0x4}, {0x6, 0xa}, {0x4, 0x2}, {0x0, 0x5}, {0x1}, {0x6, 0xa}, {0x6, 0x1}, {0x3, 0x9}, {0x3, 0x7}, {0x0, 0x2}, {0x6}, {0x7, 0x9}, {0x0, 0x5}, {0x7, 0x5}, {0x6, 0x2}, {0x1, 0x8}, {0x6, 0xa}, {0x1, 0x3}, {0x5, 0x7}, {0x5, 0x6}, {0x3, 0xa}, {0x6, 0x6}, {0x1, 0x2}, {0x6}, {0x1, 0x9}, {0x2, 0x2}, {0x1, 0x9}, {0x2, 0x4}, {0x1, 0x9}, {0x6}, {0x7, 0x6}, {0x6, 0x4}, {0x7, 0x9}, {0x3, 0x1}, {0x6, 0x8}, {0x5, 0xa}, {0x4, 0x4}, {0x2, 0xa}, {0x0, 0x5}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xfff9, 0x4, 0x1000, 0x0, 0xc510, 0x80, 0x0, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0xb1, 0x2, 0x3ff, 0x2, 0x9, 0x1000, 0x9]}}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x6c, 0x1, 0x24, 0x9, 0x18, 0x9, 0x1b, 0x0, 0x18, 0x60, 0x48, 0x48, 0x32, 0x36, 0x36, 0x24, 0x9, 0x1, 0x30, 0x6, 0x4, 0x24, 0x48]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x439b, 0x3, 0x40, 0x9, 0x5, 0x3, 0x101, 0x55]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x1e, 0x2, [{0x0, 0x1}, {0x1}, {0x0, 0x2}, {0x1, 0x9}, {0x1, 0x7}, {0x0, 0x7}, {0x6, 0x1}, {0x5, 0x4}, {0x6, 0x9}, {0x6, 0x9}, {0x3, 0x8}, {0x7, 0x7}, {0x4, 0x4}, {0x2, 0x8}, {0x0, 0x1}, {0x0, 0x2}, {0x6, 0x5}, {0x5, 0xa}, {0x3, 0x8}, {0x3, 0x8}, {0x4, 0x9}, {0x3, 0xa}, {0x0, 0xa}, {0x0, 0x6}, {0x1, 0x2}, {0x7, 0x6}]}]}, @NL80211_BAND_2GHZ={0x24, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x20, 0x2, [{0x5}, {0x1, 0x2}, {0x1, 0x6}, {0x3, 0x2}, {0x1, 0x4}, {0x5, 0xa}, {0x0, 0x5}, {0x1, 0x3}, {0x1, 0x7}, {0x0, 0x6}, {0x0, 0x3}, {0x1, 0x9}, {0x7, 0x5}, {0x0, 0x4}, {0x1}, {0x1, 0x3}, {0x5, 0x7}, {0x4, 0x1}, {0x0, 0x8}, {0x6, 0x3}, {0x4, 0xa}, {0x2}, {0x5, 0x5}, {0x7, 0x3}, {0x2, 0x3}, {0x0, 0x4}, {0x5, 0x2}, {0x7, 0x7}]}]}, @NL80211_BAND_60GHZ={0x60, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x5, 0x1, [0x2]}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x6c, 0x24, 0x9, 0x16, 0x18, 0x30, 0x36, 0x60, 0x16, 0x3, 0x30, 0x48, 0x18, 0x48, 0x4, 0x36, 0x0, 0x3, 0x1, 0x48, 0x2]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x5, 0x4, 0x7f, 0xff, 0x7, 0x401, 0x82]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x55f, 0xf001, 0x3, 0x2295, 0x7f, 0x6, 0x6fc4, 0x3]}}]}, @NL80211_BAND_60GHZ={0x104, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x4d, 0x2, [{0x5, 0x8}, {0x7, 0x7}, {0x0, 0xa}, {0x0, 0x3}, {0x0, 0x2}, {0x2, 0x4}, {0x0, 0xa}, {0x5, 0x3}, {0x6, 0x9}, {0x1, 0xa}, {0x4, 0x4}, {0x4, 0x5}, {0x2, 0x5}, {0x1, 0x2}, {0x4, 0x2}, {0x0, 0x2}, {0x7, 0x6}, {0x7, 0x7}, {0x0, 0x2}, {0x7, 0x4}, {0x1}, {0x0, 0x8}, {0x0, 0x2}, {0x6, 0x1}, {0x7, 0x7}, {0x1, 0x3}, {0x0, 0x8}, {0x2, 0x2}, {0x2, 0x4}, {0x2, 0x3}, {0x3, 0x4}, {0x0, 0x3}, {0x1, 0x4}, {0x0, 0x5}, {0x5, 0x7}, {0x5, 0x6}, {0x3, 0x8}, {0x5, 0x5}, {0x1, 0x9}, {0x5, 0x6}, {0x6, 0x8}, {0x0, 0x4}, {0x2, 0x2}, {0x2}, {0x4, 0x4}, {0x2, 0xa}, {0x6, 0x9}, {0x0, 0x5}, {0x5, 0x5}, {0x1, 0xa}, {0x3, 0x6}, {0x1, 0x4}, {0x5, 0x7}, {0x0, 0x6}, {0x7, 0x9}, {0x4}, {0x1, 0x3}, {0x4, 0x8}, {0x3, 0x6}, {0x1, 0x8}, {0x3, 0xa}, {0x0, 0x1}, {0x3, 0x1}, {0x4, 0x4}, {0x4, 0x7}, {0x1, 0xa}, {0x1, 0x5}, {0x4, 0x7}, {0x6, 0x6}, {0x6, 0x8}, {0x1}, {0x2, 0x7}, {0x4, 0x7}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0xb4, 0x3, 0xfcb, 0x6117, 0x0, 0x1]}}, @NL80211_TXRATE_HT={0x7, 0x2, [{0x1, 0x2}, {0x1, 0x4}, {0x1, 0x6}]}, @NL80211_TXRATE_HT={0x23, 0x2, [{0x7, 0x9}, {0x7, 0x2}, {0x2, 0x2}, {0x3, 0x7}, {}, {0x3, 0x8}, {0x4, 0x1}, {0x4, 0x6}, {0x2, 0x8}, {0x7, 0x6}, {0x7, 0x4}, {0x7, 0x8}, {0x6, 0x2}, {0x0, 0x1e}, {0x4, 0x8}, {0x6, 0x3}, {0x4}, {0x6, 0x4}, {0x6}, {0x0, 0x6}, {0x0, 0x3}, {}, {0x7}, {0x7, 0x5}, {0x1, 0x7}, {0x7, 0x8}, {0x7, 0x8}, {0x2, 0x7}, {0x6, 0x4}, {0x1}, {0x6, 0x5}]}, @NL80211_TXRATE_HT={0x3e, 0x2, [{0x3, 0xa}, {0x3, 0x2}, {0x3, 0x2}, {0x1, 0xa}, {0x3, 0x3}, {0x4}, {0x6, 0x4}, {0x4, 0x8}, {0x5, 0x7}, {0x6, 0x9}, {0x7, 0x9}, {0x6, 0x3}, {0x2}, {0x4, 0x3}, {0x1, 0x5}, {0x4, 0x5}, {0x4, 0x4}, {0x2, 0x2}, {0x4, 0x8}, {0x1, 0x3}, {0x4, 0x4}, {0x7, 0x4}, {0x3}, {0x0, 0x5}, {0x3, 0x2}, {0x6, 0x3}, {0x1, 0x1}, {0x1, 0x2}, {0x0, 0x2}, {0x7, 0x7}, {0x5, 0xa}, {0x2, 0x5}, {0x7, 0x9}, {0x7}, {0x7, 0x2}, {0x5, 0x5}, {0x0, 0x5}, {0x0, 0x9}, {0x5, 0x5}, {0x6, 0x4}, {0x3, 0x9}, {0x4, 0x1}, {0x6, 0x9}, {0x6}, {0x3, 0x1}, {0x0, 0x9}, {0x2}, {0x1, 0x2}, {0x5, 0x4}, {0x1, 0x1}, {0x6, 0x5}, {0x5}, {0x0, 0x3}, {0x4, 0xa}, {0x5, 0x4}, {0x4, 0x7}, {0x0, 0xa}, {0x1, 0x6}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x400, 0x4, 0x7, 0x7, 0x100, 0x91, 0x5, 0x8]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xb33, 0xffff, 0x6c2d, 0xfffc, 0x7fff, 0x0, 0x1, 0x1]}}]}, @NL80211_BAND_6GHZ={0xa0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x48, 0x5, 0x60, 0x1, 0xb, 0x6c, 0x4, 0x5, 0x1, 0x1, 0x6c, 0x36, 0x48, 0x2, 0x12]}, @NL80211_TXRATE_HT={0x48, 0x2, [{0x4, 0x5}, {0x6, 0x9}, {0x6, 0x4}, {0x0, 0x8}, {}, {0x4, 0x2}, {0x4, 0x2}, {0x0, 0xa}, {0x4, 0x9}, {0x6}, {0x2, 0x5}, {0x0, 0x7}, {0x4, 0x4}, {0x1, 0x1}, {0x7}, {0x4, 0x1}, {0x6, 0x2}, {0x6, 0x9}, {0x5, 0x1}, {0x6, 0x6}, {0x1, 0x2}, {0x1, 0x1}, {0x0, 0x7}, {0x1, 0xa}, {0x4, 0x4}, {0x0, 0x5}, {0x5, 0x9}, {0x2, 0x9}, {0x6, 0x1}, {0x1, 0x8}, {0x0, 0x8}, {0x5, 0x1}, {0x7, 0x7}, {0x6, 0x9}, {0x2}, {0x6, 0x2}, {0x5, 0xa}, {0x3, 0x4}, {0x7, 0x4}, {0x7, 0x5}, {0x3, 0x7}, {0x2, 0x1}, {0x1, 0x3}, {0x2, 0xa}, {0x6, 0x5}, {0x5, 0x1}, {0x4, 0x6}, {0x3}, {0x0, 0xa}, {0x2}, {0x2, 0x9}, {0x4, 0x7}, {0x7, 0x6}, {0x4, 0x5}, {0x2, 0x1}, {0x4, 0x8}, {0x4, 0x4}, {0x3, 0x4}, {0x0, 0x3}, {0x6, 0x8}, {0x5, 0x9}, {0x0, 0x3}, {0x5, 0x1}, {0x6, 0x6}, {0x4, 0x6}, {0x5, 0xa}, {0x7, 0x7}, {0x5}]}, @NL80211_TXRATE_HT={0x15, 0x2, [{0x7, 0x5}, {0x1}, {0x0, 0x6}, {0x2, 0x3}, {0x0, 0x3}, {0x7, 0x5}, {0x4, 0x5}, {0x6, 0x4}, {0x6, 0x7}, {0x1, 0x9}, {0x4, 0x5}, {0x3, 0x6}, {0x0, 0x6}, {0x6, 0x2}, {0x7, 0xa}, {0x1, 0x1}, {0x3, 0x3}]}, @NL80211_TXRATE_HT={0x20, 0x2, [{0x7}, {0x2, 0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x3, 0x3}, {0x4, 0x5}, {0x4, 0x7}, {0x1, 0x3}, {0x6, 0xa}, {0x7}, {0x5, 0x9}, {0x2, 0x2}, {0x2, 0x3}, {0x5, 0x5}, {0x6, 0x9}, {0x7, 0x1}, {0x5, 0xa}, {0x7, 0xa}, {0x1, 0x1}, {0x0, 0xa}, {0x5, 0x2}, {0x2, 0x7}, {0x7, 0x7}, {0x6, 0x7}, {0x5, 0x6}, {0x4, 0x9}, {0x7, 0x2}, {0x6, 0x6}]}]}, @NL80211_BAND_60GHZ={0x44, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0xa42, 0x3, 0x3f, 0xffff, 0x1f, 0x2, 0xf6f]}}, @NL80211_TXRATE_HT={0x15, 0x2, [{0x7, 0x6}, {0x2}, {0x6, 0x3}, {0x5, 0x7}, {0x4}, {0x4, 0x1}, {0x6, 0x5}, {0x1, 0x3}, {0x3, 0x8}, {0x7}, {0x5, 0x8}, {0x1, 0x2}, {}, {0x7, 0xa}, {0x0, 0x7}, {0x0, 0x4}, {0x1, 0x2}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x80, 0x0, 0x9, 0x0, 0x400, 0x400, 0x6]}}]}, @NL80211_BAND_5GHZ={0x48, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x1, 0x1, 0x6, 0x3c5f, 0x7ff, 0xffff, 0x8001]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x4, 0x1ff, 0x5f, 0x200, 0x3, 0x6, 0x7fff]}}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x5, 0x16, 0x36, 0xb, 0x1b, 0xb, 0x24, 0x11]}]}, @NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0xf495, 0xc252, 0x1, 0x207a, 0x3, 0x2, 0x3, 0x9]}}]}, @NL80211_BAND_5GHZ={0x20, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x7, 0x1, [0x48, 0x2, 0x16]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x5, 0xff, 0x4, 0x81, 0x7f, 0x9456, 0x4]}}]}]}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x2cc, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x6c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x39, 0x2, [{0x0, 0x2}, {0x3, 0x8}, {0x5, 0x1}, {0x1, 0x5}, {0x0, 0x2}, {0x7, 0x2}, {0x0, 0x4}, {0x6, 0x6}, {0x4, 0xa}, {0x3, 0x1}, {0x3, 0xa}, {0x5, 0x2}, {0x0, 0x4}, {0x7}, {0x4, 0x9}, {0x0, 0x5}, {0x5, 0x4}, {0x6, 0x9}, {0x6, 0xa}, {0x6, 0x6}, {0x6, 0x9}, {0x2, 0x6}, {0x0, 0x1}, {}, {0x6, 0x8}, {0x3, 0x1}, {0x1, 0x6}, {0x6, 0x5}, {0x3, 0x2}, {0x6, 0x7}, {0x0, 0x9}, {0x4, 0xa}, {0x5, 0x3}, {0x1, 0xa}, {0x7, 0xa}, {0x0, 0x9}, {0x5, 0x4}, {0x7, 0x5}, {0x2, 0x1}, {0x2, 0x3}, {0x0, 0x6}, {0x6, 0x5}, {0x3, 0xa}, {0x1, 0xa}, {0x2, 0x4}, {0x1, 0x7}, {0x1, 0x3}, {0x1, 0x8}, {0x4}, {0x5, 0x1}, {0x5, 0x9}, {0x2, 0x2}, {0x3, 0x6}]}, @NL80211_TXRATE_LEGACY={0x23, 0x1, [0x36, 0x12, 0xb, 0x36, 0xf, 0x1b, 0x4, 0x9, 0x24, 0x6c, 0x6c, 0x24, 0x9, 0x6, 0x6c, 0x24, 0x30, 0x9, 0x6c, 0x4, 0xb, 0xb, 0x6, 0x3, 0x18, 0x60, 0x24, 0x60, 0x24, 0xc, 0x9]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x54, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x18, 0x5, 0x1, 0x60, 0x2, 0x48, 0x24, 0x48, 0xcbbfb879ead1546e, 0x3, 0x4, 0x0, 0xb, 0x3, 0x60, 0x12, 0x12, 0x60, 0xc, 0x9, 0x9, 0x3, 0x30, 0x19, 0x4, 0x1b]}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x6, 0x6, 0x9, 0x30, 0x36, 0x24, 0xc, 0x9, 0x1, 0x5, 0x6, 0x2b, 0x3, 0x60, 0x16, 0x18, 0x18, 0x1b, 0x16, 0x0, 0x9]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x200, 0x81, 0x20, 0x0, 0x1ff, 0x8, 0x1]}}]}, @NL80211_BAND_60GHZ={0x70, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x23, 0x1, [0x0, 0x12, 0x1, 0x48, 0x6c, 0x6c, 0x9, 0x1b, 0x1, 0x2, 0x18, 0x6, 0x6, 0x16, 0x18, 0x1, 0xb, 0x24, 0x1b, 0x36, 0x1, 0x9, 0x12, 0xb, 0x36, 0x60, 0x60, 0x48, 0x6, 0x9, 0xc]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x30, 0x6c, 0x1, 0x36, 0x36, 0x5, 0x1, 0x12, 0x9, 0x4, 0xb, 0xc, 0x30, 0x0, 0x36, 0x6c, 0x60, 0x9, 0x12, 0x4, 0x1b]}, @NL80211_TXRATE_HT={0x10, 0x2, [{0x1, 0x7}, {0x0, 0x7}, {0x0, 0x8}, {0x6}, {0x4, 0x9}, {0x3, 0x5}, {0x0, 0x5}, {0x2, 0x9}, {0x4, 0xa}, {0x5, 0xa}, {0x5, 0x2}, {0x1, 0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x1, 0x155, 0x29c7, 0x5, 0xc579, 0x240, 0x1]}}]}, @NL80211_BAND_60GHZ={0x4c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x23, 0x1, [0x48, 0x62f2e2e7e50a0590, 0x48, 0x16, 0x60, 0x30, 0x5, 0x16, 0x6c, 0xc2, 0x48, 0x9, 0x36, 0x6c, 0x36, 0x36, 0x3, 0x0, 0x5, 0x37, 0x16, 0x18, 0x60, 0x5, 0x5, 0x26, 0x2, 0x6, 0x30, 0x16, 0x4]}, @NL80211_TXRATE_LEGACY={0x8, 0x1, [0x36, 0x5, 0x30, 0x48]}, @NL80211_TXRATE_HT={0x1c, 0x2, [{0x1, 0x2}, {0x4, 0x2}, {0x1, 0x9}, {0x6, 0x2}, {0x3, 0x2}, {0x0, 0x7}, {0x3, 0x9}, {0x3, 0x4}, {0x5, 0x9}, {0x7, 0x6}, {0x6, 0x3}, {0x1, 0x5}, {0x2, 0x6}, {0x1, 0x3}, {0x6, 0x4}, {0x2, 0x9}, {0x0, 0xa}, {0x2, 0x4}, {0x1, 0x2}, {0x7, 0x3}, {0x0, 0x3}, {0x4, 0xa}, {0x1, 0x3}, {0x1, 0x4}]}]}, @NL80211_BAND_5GHZ={0x80, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x5, 0x2, [{0x2, 0x4}]}, @NL80211_TXRATE_LEGACY={0x20, 0x1, [0x16, 0x48, 0xc, 0x3, 0x1b, 0x1, 0x2, 0x30, 0x30, 0xb, 0x16, 0x35, 0xb, 0x1b, 0xc, 0x1b, 0x18, 0x48, 0x4, 0x4, 0x16, 0x30, 0x4, 0x60, 0x24, 0x24, 0x16, 0x1]}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x4, 0x5, 0xc, 0x9, 0x2d, 0x2, 0x36, 0x1, 0x24]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xe73, 0x8, 0x3, 0x7f1f, 0xffff, 0xdc75, 0x9, 0x9]}}, @NL80211_TXRATE_LEGACY={0x1f, 0x1, [0x6, 0x9, 0xc, 0x1, 0x1, 0x2, 0x18, 0x30, 0x3, 0x4, 0x12, 0x9, 0x30, 0x2d, 0x48, 0x5, 0x16, 0x6c, 0x1, 0x48, 0x9, 0x24, 0x30, 0xc, 0x35, 0x24, 0xb]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0xcc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x4, 0x7f, 0x4, 0x1, 0x7, 0xfccb, 0x1ff]}}, @NL80211_TXRATE_HT={0x40, 0x2, [{0x6, 0x2}, {0x4, 0x7}, {0x6, 0xa}, {0x2}, {0x2, 0xa}, {0x1}, {0x0, 0x2}, {0x0, 0x7}, {0x2, 0x1}, {0x4, 0x2}, {0x1, 0x5}, {0x1, 0x6}, {0x4}, {0x2, 0x6}, {0x1, 0x8}, {0x5, 0x8}, {0x0, 0x7}, {0x6, 0x8}, {0x5}, {0x6, 0x8}, {0x1, 0x1}, {0x1, 0x1}, {0x1, 0x3}, {0x6, 0x6}, {0x5, 0x9}, {0x4, 0x9}, {0x1, 0x3}, {0x3, 0x9}, {0x0, 0x7}, {0x7}, {0x4, 0x9}, {0x2, 0x7}, {0x0, 0x9}, {0x1, 0x2}, {0x0, 0x9}, {0x6, 0xa}, {0x4, 0xa}, {0x2, 0x1}, {0x5, 0x7}, {0x3, 0x7}, {0x1, 0x6}, {0x5, 0x4}, {0x0, 0x7}, {0x3, 0x1}, {0x0, 0x3}, {0x3, 0x7}, {0x0, 0x1}, {0x0, 0x2}, {0x5}, {0x5, 0x1}, {0x7, 0xa}, {0x7, 0x3}, {0x7, 0x5}, {0x2, 0x8}, {0x4}, {0x1, 0x1}, {0x5, 0x2}, {0x3, 0x8}, {0x0, 0xa}, {0x7, 0x4}]}, @NL80211_TXRATE_LEGACY={0xa, 0x1, [0x48, 0x30, 0xa, 0xb, 0x12, 0x5]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7f, 0xfff, 0xfff8, 0xf9, 0xfbb4, 0x1, 0x100, 0x4]}}, @NL80211_TXRATE_LEGACY={0xf, 0x1, [0x5, 0x48, 0x48, 0xb, 0x5, 0x12, 0x16, 0x6c, 0x3, 0xb, 0x4]}, @NL80211_TXRATE_HT={0x44, 0x2, [{0x0, 0xa}, {0x2, 0x6}, {0x0, 0x9}, {0x2, 0x5}, {0x3, 0x4}, {0x1, 0x6}, {0x5, 0x3}, {0x3, 0x9}, {0x5, 0x8}, {0x1, 0x5}, {0x0, 0x9}, {0x6, 0xa}, {0x5, 0x6}, {0x6}, {0x4, 0x6}, {0x2, 0x2}, {0x2, 0x7}, {0x1, 0x9}, {0x1, 0x7}, {0x2, 0x1}, {0x6, 0x4}, {0x4, 0x8}, {0x1}, {0x1, 0xa}, {0x1, 0x2}, {0x1, 0x5}, {0x2, 0x4}, {0x7, 0x2}, {0x1, 0x9}, {0x0, 0x6}, {0x5, 0x4}, {0x6, 0x4}, {0x3, 0x3}, {0x0, 0xa}, {0x4, 0x4}, {0x3, 0x8}, {0x5, 0x9}, {0x2, 0x7}, {0x3, 0x6}, {0x1}, {0x5, 0x8}, {0x0, 0x4}, {0x2, 0x2}, {0x0, 0x1}, {0x3, 0x2}, {0x6, 0x8}, {0x2, 0x6}, {0x1, 0x9}, {0x7, 0x7}, {0x0, 0x9}, {0x7, 0x4}, {0x2, 0x9}, {0x4, 0x8}, {0x4, 0x2}, {0x3, 0x5}, {0x3, 0x5}, {0x1, 0x5}, {0x2, 0x8}, {0x7, 0x7}, {0x1, 0x4}, {0x1, 0x2}, {0x1}, {0x2, 0x6}, {0x1, 0xa}]}]}]}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xe8}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x5}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x7}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x7}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x7a}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xeb}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x4000000000000000}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xe4}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}]}]}, @NL80211_ATTR_TID_CONFIG={0x260, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x24}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x3b0bf644}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x77}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xec}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x2}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}]}, {0x21c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x1ec, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x34, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x8001, 0x0, 0x1000, 0x7fff, 0x2, 0x1, 0x1]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xad00, 0x8d, 0x1, 0x8b9, 0x5, 0x6, 0x4, 0x7a8]}}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0xa0, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0xf001, 0x80, 0x6, 0x9, 0x1, 0x5, 0x8]}}, @NL80211_TXRATE_HT={0x26, 0x2, [{0x3, 0x2}, {0x4, 0x5}, {0x4, 0x3}, {0x3}, {0x1}, {0x5, 0x6}, {0x0, 0x8}, {0x5, 0x3}, {0x7}, {0x7, 0x5}, {0x4, 0x1}, {0x2, 0xa}, {0x5, 0x1}, {0x0, 0x4}, {0x4, 0x1}, {0x1, 0x8}, {0x7, 0x3}, {0x4, 0x5}, {0x6, 0xa}, {0x2, 0x8}, {0x7}, {0x4}, {0x4, 0x3}, {0x1}, {0x0, 0x9}, {0x6}, {0x1, 0x8}, {0x1, 0x2}, {0x2, 0x8}, {0x1}, {0x2, 0x1}, {0x4}, {0x0, 0x4}, {0x3, 0x5}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x2, 0x4, 0x7fff, 0x1, 0xae81, 0xf800, 0xcec]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x401, 0x7, 0x7, 0x4, 0x0, 0x3, 0x5]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x200, 0x71e, 0x2c2b, 0x200, 0x8, 0x8000, 0x9, 0x6a]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x20, 0x6, 0x2d3, 0x9, 0x6, 0x76, 0x100, 0x401]}}]}, @NL80211_BAND_6GHZ={0x20, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x2e95, 0x7ff, 0x8999, 0x0, 0x7, 0x6, 0x6]}}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0xc, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0xcc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x29, 0x2, [{0x2, 0x8}, {0x6, 0x1}, {0x3, 0x5}, {0x2, 0x5}, {0x2, 0x3}, {0x0, 0x4}, {0x4, 0xa}, {0x3, 0xa}, {0x1, 0x7}, {0x5, 0x9}, {0x6, 0x6}, {0x4, 0x2}, {0x1, 0x7}, {0x3, 0x7}, {0x6, 0x1}, {0x3, 0x5}, {0x3, 0x1}, {0x3, 0x5}, {0x6, 0x2}, {0x0, 0x1}, {0x3}, {0x3, 0xa}, {0x6, 0x3}, {0x7, 0x2}, {0x0, 0x9}, {0x6, 0x3}, {0x0, 0x7}, {0x2, 0x5}, {0x3, 0x4}, {0x4}, {0x7}, {0x5, 0xa}, {0x0, 0x1}, {0x7, 0xa}, {0x0, 0xa}, {0x2, 0x3}, {0x3}]}, @NL80211_TXRATE_HT={0x40, 0x2, [{0x4, 0x7}, {0x7, 0xa}, {}, {0x2, 0x1}, {0x3, 0x3}, {0x0, 0x5}, {0x2, 0x6}, {0x6, 0x3}, {0x2, 0x8}, {0x5, 0x7}, {0x2, 0x6}, {0x1, 0x1}, {0x1, 0x7}, {0x7, 0x7}, {0x0, 0x7}, {0x0, 0x5}, {0x4}, {0x4}, {0x6, 0x1}, {0x2, 0x4}, {0x3, 0x7}, {0x3, 0x5}, {0x1, 0x6}, {0x7, 0x8}, {0x6}, {}, {0x7, 0x1}, {0x3, 0x8}, {0x3, 0x8}, {0x6, 0x2}, {0x0, 0x4}, {0x5}, {0x6, 0x1}, {0x4, 0x4}, {0x5, 0xa}, {0x2}, {0x7, 0x7}, {0x1, 0x5}, {0x5, 0x6}, {0x1, 0x1}, {0x3, 0x5}, {0x6, 0xa}, {0x6, 0x3}, {0x5, 0x6}, {0x0, 0x6}, {0x6, 0x8}, {0x5, 0x8}, {0x2}, {0x0, 0x2}, {0x3, 0x7}, {0x5, 0x1}, {0x7, 0x9}, {0x4, 0x5}, {0x2, 0x8}, {0x3, 0x2}, {0x0, 0x4}, {0x4, 0xa}, {0x1, 0x9}, {0x1, 0x1}, {0x1, 0x6}]}, @NL80211_TXRATE_LEGACY={0xb, 0x1, [0x48, 0x1b, 0xc, 0x48, 0x5, 0x6, 0x6c]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xfff, 0xfffe, 0x100, 0x390, 0x40, 0xd3, 0x2000, 0x5]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x800, 0x0, 0x9, 0x3ff, 0x81, 0x7, 0x6]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0xc, 0x2, [{0x2, 0xa}, {0x2, 0x2}, {0x4}, {0x2, 0x7}, {0x1, 0x8}, {0x1, 0x1}, {0x0, 0x6}, {0x2, 0x9}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x40, 0x97, 0x8, 0x1, 0x5, 0x7, 0x9a1]}}]}, @NL80211_BAND_5GHZ={0x1c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x16, 0x2, [{0x4, 0x6}, {0x3, 0x7}, {0x0, 0x9}, {0x6, 0x3}, {0x3, 0x9}, {0x0, 0x4}, {0x4}, {0x1, 0x9}, {0x0, 0x4}, {0x3, 0x8}, {0x2, 0xa}, {0x7, 0x8}, {0x1, 0x1}, {0x2, 0x4}, {0x1, 0x2}, {0x3, 0x6}, {0x1, 0x1}, {0x2, 0x8}]}]}]}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xdd}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xf}]}]}, @NL80211_ATTR_TID_CONFIG={0x188, 0x11d, 0x0, 0x1, [{0x15c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xb}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x101}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x114, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x34, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1a, 0x1, [0x12, 0x6, 0x48, 0xc, 0x24, 0x18, 0x12, 0x1, 0x2, 0x18, 0x5, 0x6c, 0x7d, 0x30, 0x36, 0x48, 0x24, 0x2, 0xb, 0x18, 0x18, 0x6c]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x98fb, 0x401, 0x270, 0x2, 0x12, 0x6782, 0x0, 0xff]}}]}, @NL80211_BAND_6GHZ={0xb0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1a, 0x1, [0x5, 0x9, 0x2, 0x36, 0xb, 0x12, 0x0, 0x60, 0x30, 0x2, 0x18, 0x2d, 0x9, 0x48, 0x16, 0x3, 0xb, 0x6, 0x9, 0x6, 0x0, 0x60]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x40, 0x30, 0x4, 0xfffb, 0x9, 0x4c61, 0x6, 0x8000]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x60, 0x1b, 0x6, 0xc, 0x18, 0x30, 0x12, 0x9, 0x1, 0x6, 0x6c, 0x3, 0x30, 0x1, 0x65, 0x3, 0x9, 0xb, 0x48, 0x36, 0x1, 0x16, 0x3, 0x6, 0x12, 0x0, 0x60, 0xc, 0x2]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6e, 0x1, 0xc4, 0x20, 0x400, 0x6, 0x0, 0x81]}}, @NL80211_TXRATE_HT={0x3b, 0x2, [{0x7}, {0x1, 0x4}, {0x2, 0x1}, {0x4, 0x3}, {0x1, 0x5}, {0x7, 0x5}, {0x4, 0x7}, {0x7, 0x9}, {0x1, 0x9}, {0x7, 0x12}, {0x7, 0x3}, {0x3}, {0x0, 0x8}, {0x7, 0x6}, {0x3, 0x1}, {0x1, 0x9}, {0x5, 0x4}, {0x1, 0x8}, {0x7, 0x4}, {0x6, 0x7}, {0x1, 0x5}, {0x0, 0x5}, {0x7, 0x1}, {0x0, 0x6}, {0x4, 0x3}, {0x7, 0x4}, {0x1, 0x8}, {0x5, 0x4}, {0x1, 0xa}, {0x6}, {0x3, 0x1}, {0x1, 0x5}, {0x4}, {0x6, 0x6}, {0x6}, {0x3, 0x7}, {0x5, 0x9}, {0x0, 0x6}, {0x0, 0x5}, {0x0, 0x8}, {0x4, 0x1}, {0x3, 0x7}, {0x0, 0x4}, {0x5, 0x5}, {0x2}, {0x6, 0x4}, {0x2, 0x2}, {0x6, 0x2}, {0x5, 0x2}, {0x3, 0xa}, {0x6}, {0x3, 0x5}, {0x6, 0x2}, {0x6, 0x5}, {0x2, 0x7}]}]}, @NL80211_BAND_5GHZ={0x28, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0xe, 0x2, [{0x5, 0x4}, {0x4, 0xa}, {0x4}, {0x5, 0x8}, {0x1, 0x9}, {0x2, 0xa}, {0x0, 0x1}, {0x0, 0x1}, {0x4}, {0x7, 0x3}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x80, 0x3ff, 0x7ff, 0x5, 0x2, 0xdbf1, 0x0, 0x7ff]}}]}, @NL80211_BAND_6GHZ={0x4}]}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x13}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}]}, @NL80211_ATTR_TID_CONFIG={0x294, 0x11d, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x80}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0x9a}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x100000000}]}, {0x13c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xf9}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x10}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x10c, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0xe4, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x8, 0x1, [0x36, 0x30, 0x3, 0x6]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x51, 0x2, [{0x6, 0x8}, {0x1, 0x8}, {0x4}, {0x4, 0x3}, {0x5, 0x7}, {0x0, 0xa}, {0x1, 0x9}, {0x7, 0xa}, {0x6, 0x7}, {0x7, 0x9}, {0x0, 0x2}, {0x3, 0x7}, {0x1}, {0x1, 0x6}, {0x3, 0x8}, {0x3, 0x1}, {0x5}, {0x3, 0x7}, {0x6, 0x4}, {0x7, 0x2}, {0x5, 0x5}, {0x0, 0x5}, {0x6, 0x8}, {0x4, 0x3}, {0x1}, {0x5, 0x4}, {0x3, 0x5}, {0x0, 0x9}, {0x0, 0x8}, {0x1, 0x8}, {0x5, 0x9}, {0x4}, {0x0, 0x9}, {0x6, 0x4}, {0x5, 0xa}, {0x1, 0x5}, {}, {0x7, 0x2}, {0x0, 0x3}, {0x6, 0x3}, {0x3, 0x3}, {0x4, 0xa}, {0x2, 0x2}, {0x6}, {0x4, 0x1}, {0x3, 0x5}, {0x0, 0x3}, {0x6, 0x6}, {0x5, 0x2}, {0x6, 0x9}, {0x5, 0x7}, {0x0, 0xa}, {0x3, 0x5}, {0x2}, {0x7}, {0x4, 0x1}, {0x2, 0x8}, {0x5, 0x1}, {0x2, 0x5}, {0x1, 0x8}, {0x1}, {0x6, 0x4}, {0x0, 0x4}, {0x1}, {0x3, 0x4}, {0x6, 0x1}, {0x0, 0xa}, {0x6, 0x1}, {0x4, 0x1}, {0x0, 0x7}, {0x2, 0x3}, {0x0, 0x3}, {0x3, 0x9}, {0x0, 0x5}, {0x7, 0x6}, {0x3, 0x1}, {0x7, 0x3}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xff, 0xf82, 0x7, 0x80, 0x1f, 0x6, 0x4, 0x1]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xc029, 0x4, 0x81fb, 0x469, 0xa6e, 0x0, 0x5, 0x1]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xf2d4, 0x200, 0x2, 0x6, 0x9, 0x6, 0x0, 0x1]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x401, 0x859, 0x101, 0x1, 0x8, 0x0, 0x400]}}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x60, 0x18, 0x9, 0x4, 0x48, 0x60, 0x6, 0x6c, 0x3, 0x4, 0x9, 0x9, 0x0, 0x18, 0x48, 0x4, 0x9, 0x6c, 0x16, 0x48, 0x24, 0xb, 0x4, 0x1b, 0xc, 0x18, 0x1, 0xb, 0x1b, 0x1b, 0x12, 0x60]}]}, @NL80211_BAND_2GHZ={0x24, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x18, 0x1, [0x4, 0x6, 0x24, 0x18, 0x24, 0x30, 0x60, 0x6, 0x18, 0x30, 0x5, 0xc, 0x18, 0x4, 0x2, 0x18, 0x5, 0x24, 0x6, 0x24]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}]}, {0x40, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x6}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0xffffffff}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x9c}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xbc}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x7f}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x401}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xd6}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}]}, {0x50, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x5}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xd7}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x3b67aa3e}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}]}]}]}, 0x14f8}, 0x1, 0x0, 0x0, 0x1}, 0x488d5) r5 = socket$netlink(0x10, 0x3, 0x12) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000440)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {0x4}}, './file0\x00'}) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0xf8, r2, 0x20, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xffffff2a, 0x17}}}}, [@NL80211_ATTR_SCHED_SCAN_MATCH={0x50, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x74dcf89f}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @from_mac=@device_b}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x16, 0x1, @random="628a030fd629a5e5c45948637bd5eda86e8f"}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x81}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @random="aee8820b8cdc"}]}, @NL80211_ATTR_SCAN_FREQUENCIES={0x2c, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x8000}, {0x8, 0x0, 0x3}, {0x8, 0x0, 0x5}, {0x8, 0x0, 0x2}, {0x8, 0x0, 0x2}]}, @NL80211_ATTR_SCAN_SSIDS={0x4c, 0x2d, 0x0, 0x1, [{0x9, 0x0, @random="5a8e6ff443"}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8050}, 0x4) 06:57:15 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41400, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:57:15 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:57:15 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x4000000}}], 0x2, 0x0) [ 1954.273028] loop4: detected capacity change from 0 to 522 [ 1954.288994] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1954.290558] EXT4-fs (loop4): get root inode failed [ 1954.290984] EXT4-fs (loop4): mount failed 06:57:15 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 1954.329060] loop4: detected capacity change from 0 to 522 06:57:15 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x4) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x181002, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x50f201, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454ce, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r3, 0x400454ce, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r4, 0x400454ce, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r5, 0x400454ce, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES16=r5, @ANYRES64=r0, @ANYRES16=r5, @ANYRESDEC=r6, @ANYRES32], 0x13, 0x1) write$binfmt_misc(r1, &(0x7f00000001c0)={'syz1', "a256596c69a414c9d800e13bce3434af157227203e515ed00b26582e26f5edfcce71a01618b7120897ea94e3c75668e1dafceef01009f8204a99d4eca8ea509efcbce878e4326dcc7fbe50928de2785df617c6f7e3b9782e285e786c8d0c3d0ddf19a1472c36466756e916d50e3a62487b4b4d73887a5b2994aa4e7682a086e5388f523bb45e38d0e33dd96e40d3465def12999fa3efb0436e035c1bb3c5eebcf51585c33275664c5db18bfabb37934e3e9788f1b1d93df355041d8aaad306192a3940a4ff77f371fd8048813a"}, 0xd1) [ 1954.347633] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1954.349484] EXT4-fs (loop4): get root inode failed [ 1954.349884] EXT4-fs (loop4): mount failed 06:57:16 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:57:28 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:28 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8000000}}], 0x2, 0x0) 06:57:28 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2}, [@CTA_EXPECT_TIMEOUT={0x8}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'ftp-20000\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0000}, 0xc005) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:57:28 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x1, 0x9, 0x4, 0x0, 0x0, 0x2, 0x40218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0xfffffffffffffffc, 0xfffffffe, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:57:28 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:57:28 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:57:28 executing program 1: pipe2(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x8002002}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:57:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 1966.512736] loop4: detected capacity change from 0 to 528 [ 1966.521198] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1966.522554] EXT4-fs (loop4): get root inode failed [ 1966.522905] EXT4-fs (loop4): mount failed [ 1966.540526] loop4: detected capacity change from 0 to 528 06:57:28 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) close(r1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:57:28 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) [ 1966.565891] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1966.567709] EXT4-fs (loop4): get root inode failed [ 1966.568062] EXT4-fs (loop4): mount failed 06:57:28 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:28 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x6e) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:57:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42010, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:57:28 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:57:28 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:57:28 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8060000}}], 0x2, 0x0) 06:57:28 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x8001, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1966.740958] loop4: detected capacity change from 0 to 528 06:57:28 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1966.776320] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1966.779039] EXT4-fs (loop4): get root inode failed [ 1966.779889] EXT4-fs (loop4): mount failed 06:57:28 executing program 5: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:28 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xe000000}}], 0x2, 0x0) 06:57:28 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:57:40 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:57:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42400, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:57:40 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000001340)=ANY=[@ANYBLOB="040ebdd3423bf79ea91b6f82036ef79a6c95fa6ceccbcca70afa1a3ac15cef4f25d4079fe6d164b28883fd297f6e6b87f7b3d9f86a7fc19484cdde7aefa398e95ba4e4521bc26c881ef89a8778a8f56b60514cf54b530d356bc551133171e27fad55ac6a892ac444589e1efb608e4fa185fd9225d42b6bd9622c0f511ba72b4b9745bae082d3de493313d2fd2e0dee95f673c45e79813f4d661c50883d90aa0a9649a308927a1b648011584d63a2fcb61066c0186da4b45a51b606702f956fc7fa85ef003112ae00"/212], 0x13, 0x0) r0 = socket(0x2b, 0x6, 0x8001) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680), 0xffffffffffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000001240)=""/158, &(0x7f0000001300)=0x9e) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x20, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x7f}}, ["", "", ""]}, 0x24}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r2, 0x0, r3, 0x0, 0x4, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) openat(r2, &(0x7f0000000200)='./file0\x00', 0x16d00, 0x1) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x8, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0xbf1}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20004001}, 0x0) 06:57:40 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f0000000080)={0x1, 0x301d27c2, 0xb7, &(0x7f00000001c0)=""/183}) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x4044801) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:57:40 executing program 5: pipe2(&(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:40 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x11000000}}], 0x2, 0x0) 06:57:40 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:57:40 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1979.233636] loop4: detected capacity change from 0 to 530 06:57:40 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) [ 1979.282745] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1979.301395] EXT4-fs (loop4): get root inode failed [ 1979.302117] EXT4-fs (loop4): mount failed [ 1979.326065] loop4: detected capacity change from 0 to 530 [ 1979.342263] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1979.347128] EXT4-fs (loop4): get root inode failed [ 1979.347953] EXT4-fs (loop4): mount failed 06:57:54 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000400)=ANY=[@ANYBLOB="1d2dafffb85bc80be16ca402bb6aa36c9ac87808a8a16982e77e07a7e6e56507147e944a79b74af82443c84aba3ecc02d98425fb7afbb19fd20686337795ac46c9464e63ced6cbb2fee703e73a01f545535edb74165b6eef2e36bd41a1281d1ff8549cdd4c298c3f4349631170157a9cf9782d14c205ddc4702b55742eb0a6c2c2ac83aaf63b1db8112dbc42f9c8a318dc3e7cfaf114a3dffc429581e5f4684ec4c3262ef0cbaf0010000000000000e3356f46eb9cd5b4495d403933746b8e5e65f4f88cc74fe9b14662f389e5ce41fd5488c7dc66c828b0bc68815f63bdb0eaf759f940821919aff3c2cd0735ae408b9505fa75e9cd77f757e786ac771de978fe04f3051ea67336b3110e6f685e91258fa78a2e79f22d9bb7a86620c910c5c4686ebf674dadc4fcdd0edb4fd4545b2761a6847ab30bfedbba390000000000000000006546fce27ee4115ce499e83ba7085bdd19589e3cd393e5fde6cead405e8595a5083c18adb4828f1f4bd78783d4ea19a059fa32a0b9aaa03e39bd0b95a94a80835a6e01784a93ed0bd9aa15d4d865960771923200333c7f337e0cd3bcf856da4d9ad97272215995bf99199d955bdbb73cdb49e36d99f61771c21014b4d517399449adca8f830607273af99681fb32e346072982950a2013d1b2809277889c72f16eb2d1ad5557e3ee8a398d3474a9f7385e1f06458079130457e4edb7fefb31255c91aa591c841ab69e4cdc7bc359dc3c583779b30d3747893d73c56b787b355928"], 0x13, 0x1) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0/file0', [{0x20, '#+'}, {0x20, 'security.evm\x00'}, {0x20, 'security.evm\x00'}, {0x20, 'security.evm\x00'}, {0x20, '+'}, {0x20, '$\\+'}, {}, {0x20, 'syz0'}], 0xa, "5707241b94ef8484659e3662f7ea4688908830f0e15bd3bd5d3112a873f67391f370e99e71c3c001cedf88d94404ba0b362139f4c2dfbf2a29ba298ccd26131c47627c8a4e60d690b0adbd8a78babda2a553db76333bd24cb2195abf3458e27a"}, 0xaa) 06:57:54 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x43050000}}], 0x2, 0x0) 06:57:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:54 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="7764bdfa"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) close(r1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00'], 0x13, 0x1) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="f001000072bfbef96078be5c2b66e61a1d5b150f6a8cd126df7bf66a4a24ef8f2f0fe1371adacc956cd1bbcb25b6be1db132c6ab7979ca457ac5599aeb06c3c770b6f427b635bbb95850cda1ca0442198dcdfc", @ANYRES16=0x0, @ANYBLOB="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"], 0x1f0}, 0x1, 0x0, 0x0, 0x4002808}, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x8, 0x50, 0x1f, 0x3, 0x0, 0x7, 0x1100, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x6, 0x800}, 0x1000, 0x8, 0x5, 0x1, 0x0, 0x7, 0x6, 0x0, 0xfff, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x6, r0, 0x0) setxattr$incfs_metadata(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)="4bb614", 0x3, 0x1) 06:57:54 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:57:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43913, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:57:54 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="0000006dd90000696c653000"]) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x78, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000001}, 0x40400c0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x178, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x98, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x8, @loopback, 0x80000000}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1f, @private1, 0x7e8a}}, {0x14, 0x2, @in={0x2, 0x4e24, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth1_to_team\x00'}}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x68}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffff01}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x180}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x77c07bd0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6238}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x40}, 0x20000055) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:57:54 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) fcntl$setownex(r0, 0xf, &(0x7f0000001700)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r2, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001680)={&(0x7f0000001640)={0x2c, 0x2, 0x7, 0x301, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x1) readv(r1, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/143, 0x8f}, {&(0x7f0000000280)=""/156, 0x9c}, {&(0x7f0000000340)=""/16, 0x10}, {&(0x7f0000000380)=""/27, 0x1b}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/197, 0xc5}, {&(0x7f00000004c0)=""/13, 0xd}], 0x7) [ 1993.210004] loop4: detected capacity change from 0 to 540 [ 1993.247305] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1993.254556] EXT4-fs (loop4): get root inode failed [ 1993.255041] EXT4-fs (loop4): mount failed 06:57:54 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="040ebddb423b", @ANYRES32=r0], 0x13, 0x1) 06:57:54 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:54 executing program 1: pipe2(0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) r1 = syz_open_dev$hiddev(&(0x7f0000000000), 0x0, 0xc00) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) close_range(r2, r0, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:57:54 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:57:55 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:55 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:57:55 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) write$binfmt_misc(r0, &(0x7f0000000380)={'syz0', "8ff1811172f63ec0b4ac6ef41be1af3250897b8986fdc36b892d80f2f858f0e85075b4c78e88929ecffe0925dd2798b86dbc825384b015e1d8c6730e1681f117e5c547d4cf1aa83f86b605dcd381be69ae42c86160ad377b4b9dd134fa5c1e6153d5ce07212d9b36de96ba6c98f6efa019456e6f2349e53b6625b2823f4efc68a7a5666092"}, 0x89) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r3, 0x20, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x7f}}, ["", "", ""]}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r3, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x2}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4088) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:57:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 1993.700817] loop4: detected capacity change from 0 to 540 [ 1993.715543] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1993.730500] EXT4-fs (loop4): get root inode failed [ 1993.730955] EXT4-fs (loop4): mount failed 06:57:55 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendfile(r0, r0, &(0x7f00000001c0)=0x81, 0x3f) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:57:55 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:57:55 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYRESDEC=r0, @ANYRESHEX=r1, @ANYRESOCT, @ANYBLOB="1004c4cbf6dd3e2e6436244c26fc8c4a93043f46bc633ff37a712b613b51cb5c78fceaf6989f828d5a24d76440eebf4628d742ec3d55650c10ef7bbebf95f71599db63", @ANYRES32], 0x13, 0x0) 06:57:55 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x20) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:57:55 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x60000000}}], 0x2, 0x0) 06:57:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:57:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 1993.857878] loop4: detected capacity change from 0 to 543 [ 1993.882449] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1993.886547] EXT4-fs (loop4): get root inode failed [ 1993.887060] EXT4-fs (loop4): mount failed 06:57:55 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebdf0423b"], 0x13, 0x0) 06:57:55 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) [ 1993.966349] loop4: detected capacity change from 0 to 543 06:57:55 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r1}) add_key$keyring(&(0x7f0000000580), &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, r1) pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/file0\x00', 0x80000000, 0x4, &(0x7f00000003c0)=[{&(0x7f00000001c0)="771d850e74132f98e32a333eb02a7634074bb221129a6b09bf8efcf1d64e5895f5646de26d0da72a285d7fa69812d808fa4c1642589e7c97cc9c6007721f44093e45be66d685de84a93ed44e722e382946231465ec6d4f0ceeec4d293dfbf5a7a3bc14be484f", 0x66, 0x1}, {&(0x7f00000000c0)="9ba95f0db3c27945bc6c7e457edec41814edf37716616fd14a93edc77deed20aaf1c357d72", 0x25, 0xa0dc}, {&(0x7f0000000240)="721415ed8660787d63286c0b899995ab43f8af1f0a1ef5d3feacd0115137a5a6ed375df6e834f53ee9899e8bca22a1c2edefd62f40ad8f90f6b4f86840655500bda46d647c3d6428ab50d48a", 0x4c, 0x3ff}, {&(0x7f00000002c0)="839a1f24eda7d502cb5364d356022cd5be1553ba17ff53d2a740e912965eea18ab19bc362731a030bda152fd58ad06a4aec698dcd20502c321c89471a871fc2f0a8eb47d1547f9fe8c4e266f04c203062ab189aff52e2862575ef5a910324d641317c2d55f2546032d8b8bd747b874d02eb6681926454f34528f19a5a59b97ecedf73c1415729d2d3aeb91c6ecfdcd6e0f22dc5a93eb0b2a186540675aea750911d6effde10b00a63f25f8b6b069bfa9c1fc4e55fd418ca66cd35a80dd6c321260964fef876313255f1ee9ff0da47ef8eec98eead5307da0add31481a63f49dff2ef7eadf81121adcb389cb95cc5ab77bdda69", 0xf3, 0x8001}], 0x0, &(0x7f0000000440)={[{@huge_never}, {@huge_never}], [{@euid_gt={'euid>', 0xffffffffffffffff}}]}) r3 = signalfd4(r2, &(0x7f00000005c0)={[0x3f99]}, 0x8, 0x80000) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x4c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x78c}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf89f}]}, 0x4c}}, 0x80) ioctl$HIDIOCGFEATURE(0xffffffffffffffff, 0xc0404807, &(0x7f0000000480)={0x7f, "746164cf4dc5a98f9a937e464ed1bd8f0dcae7f5912dedfaec4412850b9e6ad14fc930ea2b0960d928523170338881dc1a67818013c2631a72b6545dce783877"}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000540)={0x3, &(0x7f0000000500)=[{0x40, 0x5, 0x7, 0x10001}, {0x1, 0x2, 0x4, 0x2}, {0x5, 0x2, 0x7, 0x8001}]}) fcntl$setflags(r4, 0x2, 0x0) 06:57:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 1993.981377] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1993.983012] EXT4-fs (loop4): get root inode failed [ 1993.983829] EXT4-fs (loop4): mount failed 06:57:55 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x65580000}}], 0x2, 0x0) 06:57:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:57:55 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a30d55494aa85337ce7a608c5b437366b464818b0d439ecdd22110a890904dd01000000e9d4ee2d3c7f9c9675"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 1994.113579] loop4: detected capacity change from 0 to 544 [ 1994.133990] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1994.135546] EXT4-fs (loop4): get root inode failed [ 1994.135894] EXT4-fs (loop4): mount failed [ 1994.289866] loop4: detected capacity change from 0 to 544 [ 1994.303771] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 1994.307262] EXT4-fs (loop4): get root inode failed [ 1994.307993] EXT4-fs (loop4): mount failed 06:58:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:58:09 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x1) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000000be85, 0x0, 0x0, 0xa024, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:58:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:58:09 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00f0ffff"], 0x13, 0x1) 06:58:09 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x80350000}}], 0x2, 0x0) 06:58:09 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r2) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004000}, 0x8040) sendto(r2, &(0x7f00000001c0)="f97db3ac14e3c571621fb5238e7427afdca5156db856b785710c66188324179ddbc457dab9a4af6af9d3124dab541bce662598db84674e8515c8c7c4c6c2c873a70957e909c51fcc91bdf5d2e93589746b66fb82352dab5d04e7f841ffa000e3b30d9af2752520a072bc23ab05c9de98ba2cfafb9e1a0fb3aa0ae3d1744afe1195cde2511975b4e8cd01a0ac43224afa50efc4bb22896f", 0x97, 0x0, &(0x7f0000000280)=@l2={0x1f, 0x1, @any, 0x400, 0x2}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r2) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r6, 0x200, 0x70bd25, 0x25dfdbff, {}, [@DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x33}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x40}}, 0x8001) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x150, r6, 0x8, 0x70bd29, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0xff00}, {0x6, 0x11, 0x8}, {0x8, 0x15, 0x9}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x3}, {0x8, 0x15, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x1ff}, {0x6, 0x11, 0xa80a}, {0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x4}}, {0x8}, {0x6, 0x11, 0x7}, {0x8, 0x15, 0xb039}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xaeb4}, {0x6, 0x11, 0x81}, {0x8, 0x15, 0x2}}]}, 0x150}, 0x1, 0x0, 0x0, 0x41}, 0x0) 06:58:09 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="797a3000b7"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x2, 0x24) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x38, r0, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2e}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 06:58:09 executing program 2: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 2007.511073] loop4: detected capacity change from 0 to 545 [ 2007.528926] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2007.530200] EXT4-fs (loop4): get root inode failed [ 2007.530524] EXT4-fs (loop4): mount failed [ 2007.542975] loop4: detected capacity change from 0 to 545 06:58:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 2007.559908] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2007.561346] EXT4-fs (loop4): get root inode failed [ 2007.561661] EXT4-fs (loop4): mount failed 06:58:09 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00020000"], 0x13, 0x1) 06:58:21 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x81000000}}], 0x2, 0x0) 06:58:21 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffffffffe09, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[], 0x13, 0x3) 06:58:21 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200), 0x2940, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) splice(r3, &(0x7f0000000240)=0x1000, r4, &(0x7f0000000280)=0x4, 0xffffffffffff864b, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x580, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:58:21 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="7369e8fa8b335629d41840766c254c5ece56cd5ee71cb4995922200ea35b9c506c27a252f9350b5cae94eb5190d6181c8243410d494786451fce431ecd4804982b9e7d7fad6afcecd5cb80172233880699d36ce0dbe6bdfdb8c955afffd8af3a03aba011c73ac4a59347d7319b2c82b7b2915f959cadc8163b2ef32250a5c8ae24972692d015bc131abf2f52a7bb8fc6a687c28216ed00000000000000"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:58:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:58:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:58:21 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00030000"], 0x13, 0x1) 06:58:21 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='sy:0'], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x400000, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x4045f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x7}, 0x0, 0x9, r1, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 2020.285308] loop4: detected capacity change from 0 to 548 [ 2020.298659] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:58:21 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000), &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRES64=r0, @ANYRESOCT=r0, @ANYRESHEX], 0x13, 0x0) [ 2020.301796] EXT4-fs (loop4): get root inode failed [ 2020.302391] EXT4-fs (loop4): mount failed [ 2020.323306] loop4: detected capacity change from 0 to 548 [ 2020.370585] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2020.374957] EXT4-fs (loop4): get root inode failed [ 2020.375356] EXT4-fs (loop4): mount failed 06:58:36 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x6b6}}, '\x00'}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x90, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u}, {@fscache}], [{@permit_directio}, {@permit_directio}]}}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="9e72"], 0x13, 0x0) 06:58:36 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00040000"], 0x13, 0x1) 06:58:36 executing program 3: io_setup(0x1f, &(0x7f0000000640)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_submit(r0, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000600)="81", 0x1}]) ioctl$sock_ifreq(r1, 0x8932, &(0x7f0000000280)={'macvlan1\x00', @ifru_names}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r3, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r3, 0x0, 0x1) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r5 = clone3(0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r5], 0x1}, 0x58) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000740)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB="142f6652dd75786c653000"]) perf_event_open(&(0x7f00000006c0)={0x2, 0x80, 0xa5, 0x5, 0xf9, 0x4, 0x0, 0x4, 0x6082, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x8000, 0x9}, 0x1, 0x81, 0x6, 0x1, 0xa29f, 0x8, 0x1f, 0x0, 0xe428, 0x0, 0x2}, 0xffffffffffffffff, 0xe, r6, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x80, 0x3, 0x8, 0x1, 0x0, 0x2, 0x10800, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x20, 0x4efc, 0x3, 0x9, 0x3f, 0x0, 0x8, 0x0, 0x10000}, r5, 0x6, 0xffffffffffffffff, 0x11) ioctl$sock_ifreq(r2, 0x891e, &(0x7f0000000540)={'vlan0\x00', @ifru_flags}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000400)=ANY=[@ANYBLOB="4f786d3682e0800cc988c7e135cf1539c40e6b0c4facf80456858b8c0726fb1822682c65a51a9ba124e4bee4782d"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:58:36 executing program 1: pipe2(0x0, 0x4000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:58:36 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x86ddffff}}], 0x2, 0x0) 06:58:36 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000600"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r4, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r3}, @val={0xc}}}}, 0x30}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r7, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r6}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_MAC_ACL(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x140, r4, 0x8, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x20, 0x79}}}}, [@NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa}]}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x40, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa}]}, @NL80211_ATTR_MAC_ADDRS={0x4c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_MAC_ADDRS={0x34, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x1}, 0x1) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r7, 0x10, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0xa48a929aed8178eb) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:58:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x44c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:58:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 2034.404998] 9pnet_fd: Insufficient options for proto=fd [ 2034.407147] 9pnet_fd: Insufficient options for proto=fd 06:58:36 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v1={0x2, "b89f25ba5cf9c64c526a8a7027ba"}, 0xf, 0x0) [ 2034.448769] loop4: detected capacity change from 0 to 550 [ 2034.482868] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2034.488695] EXT4-fs (loop4): get root inode failed [ 2034.489427] EXT4-fs (loop4): mount failed 06:58:36 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00080000"], 0x13, 0x1) 06:58:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 2034.523261] loop4: detected capacity change from 0 to 550 06:58:36 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x88470000}}], 0x2, 0x0) 06:58:36 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="9752b8f8"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 2034.560943] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2034.568513] EXT4-fs (loop4): get root inode failed [ 2034.569233] EXT4-fs (loop4): mount failed 06:58:36 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00100000"], 0x13, 0x1) 06:58:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:58:36 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:58:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:58:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 2034.757726] loop4: detected capacity change from 0 to 560 [ 2034.806430] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2034.820640] EXT4-fs (loop4): get root inode failed [ 2034.821728] EXT4-fs (loop4): mount failed [ 2034.845872] loop4: detected capacity change from 0 to 560 [ 2034.878095] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2034.880658] EXT4-fs (loop4): get root inode failed [ 2034.881409] EXT4-fs (loop4): mount failed 06:58:49 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="c34baee38188cbe0b272d0e37a2670ff4f542aed646d2f5abbaa40"], 0x13, 0x0) 06:58:49 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x88480000}}], 0x2, 0x0) 06:58:49 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0xfffffffffffffff9, 0x40) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200)={'bridge_slave_0', 0x32, 0x1}, 0x11) r2 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, r2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000300)=ANY=[@ANYBLOB="76bd05903ed0a199e28911cfa0b35de2dc2f9c1e7aa5d6451897948d0eafc9ea721d365e357ffd913a9a397cfc68ab9e3e2127eaea974c2dc65d2eb1968bd81984fd777b63fe3afe92fe623507ac43e080618fd50e2f93dd8d3b1ae374dee79b18d0886f482b6642759f9ea13e7ad834519fdf608d9ffd442240903dc4e2ca0821f137b38bd66e90e6d9eafce4fcba7097baa9852c18f46721f8482b1553da8b5a3ed4992f3e4689a7e5806cd37bef405abeacb27affdfd01aa848575fb0c150b90ce5e170cf24b882842084d1b3c169242abd123039ba8d0a45b3c34e5b20590782da9ae7758a3d380fe54af089b00c1ba9c6d7b3a802b2fac970c5e82d9b613b79f10832a81a6d35f1d4277d2f9517fd8a41969a9ed3a7"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x4) 06:58:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:58:49 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfc, 0x200000}, 0xc) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:58:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:58:49 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="dcfb535fb4f17da331c4602fdcfc464bc35e836f24f6dcba705bc587e98a8a0ce2c1cf94f8638bf97fab4d5379a3c43a14e0e13ebf1f877dd9ec73309ba83a42aec5b99b"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r2) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc840}, 0x10) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r5 = openat$cgroup_subtree(r0, &(0x7f0000000140), 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r5) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) fallocate(r0, 0x20, 0x401, 0x7) [ 2047.411385] loop4: detected capacity change from 0 to 564 06:58:49 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00140000"], 0x13, 0x1) [ 2047.434482] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2047.444373] EXT4-fs (loop4): get root inode failed [ 2047.444844] EXT4-fs (loop4): mount failed 06:58:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r1, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 06:58:49 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00f00000"], 0x13, 0x1) [ 2047.473673] loop4: detected capacity change from 0 to 564 [ 2047.494372] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2047.495831] EXT4-fs (loop4): get root inode failed [ 2047.496314] EXT4-fs (loop4): mount failed 06:58:49 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x44, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@nodevmap}, {@mmap}, {@aname={'aname', 0x3d, 'security.evm\x00'}}, {@version_u}, {@msize={'msize', 0x3d, 0xf05}}], [{@appraise}, {@euid_lt}, {@subj_user}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfsfloor}, {@obj_role={'obj_role', 0x3d, '%!\xac/%$%[@%'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}]}}) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)='./file0\x00', r0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)=ANY=[@ANYBLOB="040ebddb423b", @ANYRESHEX=r0], 0x13, 0x0) 06:58:49 executing program 2: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x5000) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:58:49 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x88640000}}], 0x2, 0x0) 06:58:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x46c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:58:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r1, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 06:58:49 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000300"], 0x13, 0x1) [ 2047.577944] 9pnet_fd: Insufficient options for proto=fd [ 2047.584457] 9pnet_fd: Insufficient options for proto=fd [ 2047.616836] loop4: detected capacity change from 0 to 566 06:58:49 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)=ANY=[@ANYBLOB="0fe2bf0dff5d5a1763679749f8f4d1ff747e8d91ac09694a969fa1982f43fd25c1a089295d8354289fae4b387757a88d6d2cd55b75659ac6083204cb9f4009ac996cbd0cd50df444cf532074e11558063ba29d8abd3ad421ddaf8531e93c5a3a62052c4e597ba29ef340f7d63fa5c7ddb73eb81ad3e6ac602e7ef2bd50a2efe253aa866fd548958549134bb4c3f916dae049a6019aa7b2e3ebae113c37d18b343a50f4d8cc586b9aa967b60f09c77edb42d853fc04989000936ad4488eb99c2b46b80a45cfccff35d4ee0da14a933d7af5adc2389bee6c"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 2047.629885] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2047.631886] EXT4-fs (loop4): get root inode failed [ 2047.632368] EXT4-fs (loop4): mount failed 06:58:49 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00210300"], 0x13, 0x1) 06:58:49 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x88a8ffff}}], 0x2, 0x0) [ 2047.645343] loop4: detected capacity change from 0 to 566 06:58:49 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@ipv4={""/10, ""/2, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x1c, 0x0, 0x508, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) [ 2047.670905] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2047.672403] EXT4-fs (loop4): get root inode failed [ 2047.672770] EXT4-fs (loop4): mount failed 06:59:01 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000001c0)=""/47) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:01 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x9, 0x0, 0x20}) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:59:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r1, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 06:59:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x47400, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:59:01 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="040ebddb423b", @ANYRESOCT=r0, @ANYRES64=r0], 0x13, 0x0) 06:59:01 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="d5837c30"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:01 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00001400"], 0x13, 0x1) 06:59:01 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x88caffff}}], 0x2, 0x0) 06:59:01 executing program 1: pipe2(0x0, 0x80800) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) mount$9p_xen(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)={'trans=xen,', {[{@cache_loose}, {@posixacl}, {@version_9p2000}, {@cache_fscache}, {@loose}, {@access_user}, {@cache_loose}, {@cache_fscache}, {@cache_mmap}], [{@fowner_lt={'fowner<', 0xee01}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) [ 2059.864379] loop4: detected capacity change from 0 to 570 06:59:01 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000003000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000001c0)="c0917ca5f2a5e4de3e49b5078e733d7e05b5de625180eeb73f9cb4d2ace1d22b4001bae3595a913bb8a5cffd1816211546099ce6c40740ab597cb0cb986ef6e661e6e1c97a2d9c039a1bd4c8e41b67fc969651761f5a5f813119ec91334deee73673181db5c0fd2156877612a98a42ddd8515fbf71ee1cfcb86bbd6c54e27bbc8fe777313d47d790d659cc7c89e8e4c947f8cecee7a32003bc0e8ad42aec7e267b8fd5c5f72d1dd82b625f50da8d5b9bf8684864ff715bf69766bb503650cec9b44d61", 0xc3, r1}, 0x68) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:01 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00002000"], 0x13, 0x1) [ 2059.902046] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2059.907029] EXT4-fs (loop4): get root inode failed [ 2059.907979] EXT4-fs (loop4): mount failed 06:59:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:59:01 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:syslog_conf_t:s0\x00', 0x23, 0x2) [ 2059.957652] SELinux: security_context_str_to_sid (root) failed with errno=-22 06:59:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 2059.967397] loop4: detected capacity change from 0 to 570 [ 2060.026623] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2060.039707] EXT4-fs (loop4): get root inode failed [ 2060.040101] EXT4-fs (loop4): mount failed 06:59:13 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00032100"], 0x13, 0x1) 06:59:13 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x88f7ffff}}], 0x2, 0x0) 06:59:13 executing program 1: pipe2(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x81, r0, &(0x7f0000000200)="f073fafa9d4990dab394f51cb96da7cbaff6afd119a7079e3616216f8e441153d19810bd0be4756ab3d787ee0d6e18829feb2f9536800668956aa07a16d7338fbf00f49eff940ce684e53f10510154ae645d8f65240f88dd33afa916100e65ba72a5178230b57c3c08e991728fbf6b7b0a15af64f298f7c79932bab46998ceee5e9b30c9bca42c565bcacf7c4264f8473f662299", 0x94, 0x4eed8889}]) splice(0xffffffffffffffff, &(0x7f00000000c0)=0x2, 0xffffffffffffffff, &(0x7f00000001c0)=0x800, 0xaef7, 0x2) splice(0xffffffffffffffff, &(0x7f0000000000)=0x7821, 0xffffffffffffffff, &(0x7f0000000080), 0xfffffffffffffeff, 0x1) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:59:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x47a00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:59:13 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x8, 0x40, 0x7f, 0x80, 0x0, 0x5, 0x404, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000001c0), 0xccb2f4e7a30e5405}, 0x40000, 0x4, 0x84, 0x5, 0x8, 0x6, 0x0, 0x0, 0x800, 0x0, 0x6}, 0xffffffffffffffff, 0x2, r0, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:59:13 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYBLOB="73797a2b044d5d729c6cad32711a7706d72ea7e32487ad930b807d8317294e48e42cd760135b497e6ea721f97bdc2f623de71de4a90f32f270dda8ee45cd3b500f66bc0d164b263bfe044003a7863ceb65115e05e4503e234dfcca6975ac5bdb81cc731625c3c8325cf1dd6b84e115eed457bf91cd7682b6d5fcfe84653a412d53d083edd45bce4ebc2e4acd60a56f9da3cb9ed576261a7897b6b97b2cb268068518f57bbfb86a057910a2c5512c5559799a332016d6dccc2664a95e56757c5376781eb3bc3df287e71b93bfd4cfec7e50f2168bdde6fcb6085e9c0618084152e02f4648432bbd2772396b"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/software_nodes', 0x408040, 0x80) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000001600)={0xc18, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x90, 0x11d, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xd9}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xbd}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x9}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x30}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x18, 0xd, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x14, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xd, 0x1, [0x24, 0x48, 0x10, 0xb, 0x18, 0xc, 0x60, 0x1, 0x12]}]}]}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x1}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xb8}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}]}]}, @NL80211_ATTR_TID_CONFIG={0x684, 0x11d, 0x0, 0x1, [{0x184, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x174, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x54, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x3, 0x7f, 0xa4, 0x0, 0x6, 0x1, 0x7cc]}}, @NL80211_TXRATE_LEGACY={0x20, 0x1, [0x36, 0xb, 0x60, 0x30, 0x9, 0x6c, 0xb, 0x30, 0x9, 0x6, 0x9, 0xb, 0x36, 0xc, 0x24, 0x16, 0x24, 0x18, 0x36, 0x48, 0x30, 0x4, 0x1b, 0x6c, 0x30, 0x12, 0x1b, 0x5]}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x6c, 0x48, 0x6c, 0xc, 0x6, 0x16, 0x18, 0xc, 0x3, 0x4, 0x1b, 0x30, 0x6c, 0x30, 0x2, 0x36, 0x36, 0x1b, 0x6, 0x3f, 0x5]}]}, @NL80211_BAND_2GHZ={0x20, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x19, 0x2, [{0x1, 0x8}, {0x6, 0x2}, {0x0, 0x6}, {0x2, 0x2}, {0x0, 0x6}, {0x4, 0x4}, {0x1, 0x6}, {0x7, 0x2}, {0x2, 0x1}, {0x4, 0x2}, {0x3, 0x9}, {0x6, 0x6}, {0x5, 0x3}, {0x4, 0x6}, {0x6}, {0x4, 0x9}, {0x0, 0x6}, {0x5, 0x8}, {0x4}, {0x7, 0x7}, {0x7, 0xa}]}]}, @NL80211_BAND_6GHZ={0x18, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x12, 0x1, [0x36, 0x70, 0x5, 0x4, 0x36, 0x0, 0x2, 0x3, 0x48, 0x64, 0xb, 0x36, 0x18, 0x48]}]}, @NL80211_BAND_6GHZ={0x68, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x17, 0x2, [{0x0, 0x8}, {0x3, 0x9}, {0x2, 0x7}, {0x0, 0x1}, {0x3, 0x3}, {0x1, 0x8}, {0x5, 0x4}, {0x0, 0x7}, {0x0, 0x2}, {0x6, 0x2}, {0x0, 0x1}, {0x1, 0xa}, {0x4}, {0x2, 0x7}, {0x0, 0x7}, {0x6, 0x8}, {0x5, 0x7}, {0x1, 0x8}, {0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x1, 0x0, 0x57a, 0x100, 0xfc36, 0x200, 0x8]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x6, 0x1, 0x24, 0x6, 0x60]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0xa, 0x80, 0x9, 0x28, 0xff, 0x100, 0x3]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_6GHZ={0x24, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1f, 0x1, [0x2, 0x6, 0x30, 0x18, 0x2, 0x16, 0x2, 0x30, 0x1b, 0x16, 0x36, 0x5, 0x2, 0x18, 0x16, 0x18, 0x60, 0x18, 0x60, 0x2a, 0x5, 0x6c, 0x5, 0xb, 0x18, 0x30, 0xc]}]}, @NL80211_BAND_5GHZ={0x58, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x81, 0x5, 0x9720, 0x9, 0x1, 0x1000, 0x9, 0x6]}}, @NL80211_TXRATE_HT={0x36, 0x2, [{}, {0x6}, {0x1, 0x6}, {0x6, 0x5}, {0x4, 0x3}, {0x4, 0x4}, {0x4, 0x9}, {0x3, 0x4}, {0x4, 0x4}, {0x7, 0x2}, {0x3, 0x9}, {0x3}, {0x0, 0x2}, {0x0, 0x8}, {0x1, 0x9}, {0x0, 0x7}, {0x0, 0x3}, {0x7, 0x6}, {0x0, 0x1}, {0x0, 0x6}, {0x4, 0x9}, {0x5}, {0x6, 0x1}, {0x5, 0x1}, {0x2, 0x4}, {0x0, 0x6}, {0x5, 0x5}, {0x7, 0x5}, {0x7, 0x1}, {0x6, 0x2}, {0x7, 0x1}, {0x5, 0x8}, {0x2}, {0x7, 0x1}, {0x1, 0x8}, {0x3}, {0x3, 0x8}, {0x5, 0x7}, {0x0, 0x9}, {0x7}, {0x4}, {0x3}, {0x7, 0x6}, {}, {0x4, 0x7}, {0x4, 0x6}, {0x3, 0x1}, {0x3}, {0x6, 0x5}, {0x2, 0x6}]}]}]}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xa0}]}, {0x254, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x1}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x23c, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x64, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x29, 0x2, [{0x1, 0x6}, {0x0, 0x8}, {0x7, 0xa}, {0x1, 0x7}, {0x7, 0x9}, {0x2, 0x7}, {0x0, 0xa}, {0x3, 0x2}, {0x6, 0x6}, {0x3, 0x4}, {0x1, 0x1}, {0x1, 0x5}, {0x2, 0xa}, {0x5, 0xa}, {0x3, 0x9}, {0x0, 0x6}, {0x0, 0x7}, {0x7}, {0x4, 0x3}, {0x2, 0x8}, {0x3, 0x1}, {0x1, 0x3}, {0x1, 0x7}, {0x4, 0x8}, {0x1, 0x5}, {0x0, 0x6}, {0x3, 0x3}, {0x1, 0x6}, {0x6, 0x6}, {0x0, 0xa}, {0x6, 0x5}, {0x6, 0x2}, {0x1, 0x3}, {0x1, 0xa}, {0x1, 0x9}, {0x5, 0xa}, {0x2, 0x8}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xfff, 0x6, 0x0, 0x2, 0x1, 0x0, 0x2, 0x20]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7427, 0xe0, 0x0, 0x9, 0x8, 0x7, 0x3, 0xba37]}}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x30, 0x1, 0x6, 0x3, 0x2, 0xb, 0x6, 0x18]}]}, @NL80211_BAND_2GHZ={0x4}, @NL80211_BAND_6GHZ={0xb0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x2, 0xe49, 0xe2, 0x4, 0xe1, 0x40, 0x7f]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8000, 0x7ff, 0x65, 0x7, 0x7fff, 0x0, 0x0, 0x9]}}, @NL80211_TXRATE_HT={0x6, 0x2, [{0x3}, {0x7, 0x6}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x24, 0x2, [{0x2, 0x6}, {0x6, 0x9}, {0x1, 0x8}, {0x5, 0xa}, {0x3, 0x8}, {0x5, 0x3}, {0x0, 0x3}, {0x0, 0x2}, {0x6}, {0x0, 0x8}, {0x0, 0x5}, {0x1}, {0x0, 0x4}, {0x7, 0x9}, {0x2}, {0x3, 0x9}, {0x7, 0x5}, {0x0, 0x8}, {0x2, 0x3}, {0x6, 0x8}, {0x1, 0x7}, {0x7}, {0x2, 0x6}, {0x0, 0x2}, {0x0, 0x2}, {}, {0x6, 0x4}, {0x6, 0x4}, {0x3, 0x8}, {0x7, 0x1}, {0x6, 0x6}, {0x6, 0x6}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x3f, 0x2, [{0x2, 0x4}, {0x5, 0x7}, {0x7, 0x4}, {0x1, 0x5}, {0x3, 0xa}, {0x0, 0x1}, {0x1, 0x3}, {0x2, 0x9}, {0x0, 0x4}, {0x7, 0x8}, {0x5, 0x3}, {}, {0x6}, {0x2, 0x8}, {0x2, 0x4}, {0x0, 0x4}, {0x1, 0x4}, {0x6, 0x5}, {0x1, 0x7}, {0x6, 0x6}, {0x2, 0x5}, {0x0, 0x3}, {0x3, 0x4}, {0x4, 0x8}, {0x6, 0x8}, {0x5}, {0x2}, {0x3, 0x5}, {0x0, 0x4}, {0x1, 0x4}, {0x6, 0x4}, {0x5, 0x9}, {0x7, 0x7}, {0x3, 0xa}, {0x2, 0x5}, {0x2, 0x4}, {0x4, 0x8}, {0x1, 0x3}, {0x1, 0x1}, {0x0, 0x7}, {0x0, 0x7}, {0x7, 0x1}, {0x5, 0x4}, {0x2, 0x2}, {0x2, 0x7}, {0x1, 0x7}, {0x7, 0x1}, {0x1, 0x7}, {0x2, 0x1}, {0x5, 0x4}, {}, {0x1, 0x1}, {0x3, 0x2}, {0x1, 0x3}, {0x1, 0x1}, {0x6, 0x3}, {0x6, 0x6}, {0x0, 0x2}, {0x7, 0xa}]}]}, @NL80211_BAND_2GHZ={0x80, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x3d, 0x2, [{0x7, 0x2}, {0x7, 0x2}, {0x1, 0x6}, {}, {0x0, 0x2}, {0x7, 0x6}, {}, {0x0, 0x5}, {0x0, 0x8}, {0x6, 0x7}, {0x6, 0x1}, {0x4, 0xa}, {0x0, 0x3}, {0x6, 0xa}, {0x3, 0x2}, {0x0, 0x7}, {0x3, 0x2}, {0x3, 0x8}, {0x7, 0x5}, {0x5, 0x3}, {0x5, 0x1}, {0x3, 0x3}, {0x1, 0x1}, {0x6, 0x5}, {0x4, 0x2}, {0x4, 0x1}, {0x2, 0x7}, {0x1, 0x7}, {0x0, 0xa}, {0x2, 0xa}, {0x2, 0x5}, {0x5, 0x2}, {0x2, 0xa}, {0x2, 0x7}, {0x0, 0x7}, {0x3, 0x8}, {0x0, 0x7}, {0x0, 0x4}, {0x3, 0x6}, {0x4, 0xa}, {0x2}, {0x0, 0x6}, {0x6, 0x6}, {0x1, 0x7}, {0x2, 0x8}, {0x0, 0x8}, {0x3, 0x6}, {0x4}, {0x6, 0x8}, {}, {0x5, 0x3}, {0x4, 0x2}, {0x4, 0x4}, {0x1, 0x9}, {0x4, 0x9}, {0x5, 0x7}, {0x3, 0x6}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x6, 0x1, [0x16, 0x1b]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0x401, 0x4, 0x0, 0x3, 0x6, 0x9, 0x9]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_2GHZ={0x8c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0xff, 0x6, 0x401, 0x6, 0x6, 0x6, 0x0, 0x7fff]}}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x59af199d73abf6cc, 0x3, 0x4, 0x4, 0x1b, 0x24, 0x16, 0x18, 0xb, 0x18, 0x78, 0xb, 0x36, 0x1f, 0x6c, 0xb, 0x60, 0x18, 0x6, 0x1c, 0x60, 0x1b, 0x6]}, @NL80211_TXRATE_HT={0x2c, 0x2, [{0x7, 0x3}, {0x7, 0x2}, {0x0, 0x7}, {0x7, 0x5}, {0x3, 0xa}, {0x4, 0x6}, {0x6, 0x4}, {0x4, 0x5}, {0x4, 0x5}, {0x3, 0x9}, {0x1, 0x7}, {0x4, 0x8}, {0x1, 0x1}, {0x2, 0x2}, {0x1, 0x1}, {0x5, 0x8}, {0x4, 0x2}, {0x1, 0x3}, {0x3, 0x1}, {0x4, 0x3}, {0x6, 0xa}, {0x3, 0x3}, {0x2, 0x9}, {0x3, 0x6}, {0x2, 0x7}, {0x1, 0x3}, {0x5, 0x2}, {0x0, 0x1}, {}, {0x4, 0xa}, {0x3, 0x2}, {0x1, 0x7}, {0x7, 0x2}, {0x3, 0x2}, {0x3, 0x2}, {0x1, 0x6}, {0x0, 0x8}, {0x4, 0x7}, {0x4, 0x3}, {0x0, 0x1}]}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_LEGACY={0x12, 0x1, [0x12, 0x6, 0xc, 0xc, 0x12, 0x18, 0x1, 0x16, 0x6c, 0x2, 0x2, 0x3, 0x4, 0x36]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xfff, 0x9, 0x3, 0x80, 0x7ff, 0x5, 0x0, 0x2]}}]}, @NL80211_BAND_5GHZ={0x14, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}]}, {0x50, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0xcc8}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xe6}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0xfffffffffffffffd}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0x51}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x8}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}]}, {0x16c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x160, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x24, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x60, 0x24, 0x30, 0x60, 0x4, 0x36, 0x3, 0x48, 0x1b, 0xc, 0x36, 0x6, 0x24, 0x1b, 0x30, 0x3, 0x18, 0x6, 0xc, 0x30, 0x6c, 0x4, 0x2, 0xc, 0x18, 0x36]}]}, @NL80211_BAND_6GHZ={0x14, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_6GHZ={0x94, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0xf0, 0x3f, 0x401, 0x3, 0xf39d, 0x98a, 0x3f]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x2e, 0x2, [{0x0, 0x2}, {0x1, 0x4}, {0x7, 0x2}, {0x0, 0x4}, {0x2, 0x3}, {0x1}, {0x6, 0x1}, {0x6, 0x8}, {0x0, 0x8}, {0x3, 0x3}, {0x6, 0x5}, {0x5, 0x1}, {0x3, 0x5}, {0x7, 0x7}, {0x6, 0x2}, {0x0, 0x2}, {0x1, 0x4}, {0x1, 0x7}, {0x1, 0x3}, {0x6}, {0x3, 0x6}, {0x6, 0xa}, {0x1, 0x4}, {0x3, 0x8}, {0x4, 0x3}, {}, {0x4, 0xa}, {0x2, 0x8}, {0x4, 0xa}, {0x1}, {0x5, 0x4}, {0x6, 0x1}, {0x1, 0x2}, {0x2, 0x4}, {0x6, 0x8}, {0x2}, {0x3, 0x9}, {0x5, 0x1}, {0x5, 0xa}, {0x7, 0x3}, {0x0, 0x6}, {0x3, 0x4}]}, @NL80211_TXRATE_HT={0x42, 0x2, [{0x4, 0xa}, {0x5, 0x3}, {0x3, 0x5}, {0x1, 0x6}, {0x4, 0x9}, {0x1, 0x7}, {0x0, 0x5}, {0x3, 0x6}, {0x4}, {0x6, 0x9}, {0x1}, {0x4, 0x6}, {0x2, 0x6}, {0x6, 0x6}, {0x0, 0x3}, {0x0, 0x4}, {0x0, 0x7}, {0x1, 0x2}, {0x6, 0x4}, {0x0, 0x2}, {0x5, 0x9}, {0x0, 0x3}, {0x1, 0x1}, {0x6}, {0x5, 0x5}, {0x0, 0xa}, {0x5, 0x5}, {0x1}, {0x6, 0x9}, {0x4, 0x5}, {0x6, 0x1}, {0x7, 0x8}, {0x1, 0x8}, {0x2, 0x7}, {0x3, 0x5}, {}, {0x2, 0x7}, {0x4, 0x4}, {0x5, 0x8}, {0x0, 0x2}, {0x0, 0x6}, {0x4, 0x7}, {0x0, 0x5}, {0x7, 0x7}, {0x2, 0x7}, {0x2, 0xa}, {}, {0x3, 0xa}, {0x4, 0x3}, {0x7, 0x7}, {0x0, 0x5}, {0x3, 0x9}, {0x3, 0x8}, {0x3, 0x4}, {0x1, 0x1}, {0x0, 0x9}, {0x2, 0xa}, {0x7, 0x5}, {0x2, 0x4}, {0x2, 0x4}, {0x1, 0x2}, {0x4, 0x6}]}]}, @NL80211_BAND_5GHZ={0x4c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0xfffa, 0x6, 0x0, 0x1, 0x6c4, 0xf7, 0x1, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xfeff, 0x8, 0xfff9, 0x2, 0x6, 0x7fa8, 0xffff, 0x871]}}, @NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x1e, 0x36, 0x6c, 0x9, 0x36, 0xc, 0x2, 0x6c, 0x3, 0x24, 0x2, 0x6, 0x48, 0x18, 0x60, 0x30, 0xf2883eabd2c781cc, 0x16, 0x18, 0x36, 0x9, 0xb, 0x3, 0x6c, 0x2, 0x12]}]}, @NL80211_BAND_2GHZ={0x44, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x37, 0x2, [{0x5, 0x9}, {0x5, 0x9}, {0x4, 0x1}, {0x0, 0x4}, {0x3}, {0x0, 0x1}, {0x7, 0x7}, {0x2, 0x3}, {0x3, 0x6}, {0x5, 0x1}, {0x0, 0x8}, {0x4, 0x1}, {0x1, 0x4}, {0x6, 0x1}, {0x1, 0xa}, {0x4, 0x3}, {0x7, 0x4}, {0x5, 0xa}, {0x0, 0x2}, {0x4, 0x9}, {0x3, 0x4}, {0x5, 0x7}, {0x5, 0x8}, {0x0, 0x2}, {0x6, 0x9}, {0x0, 0x5}, {0x5, 0x2}, {0x3, 0x2}, {0x6, 0x6}, {0x0, 0x5}, {0x4, 0x8}, {0x5}, {0x5, 0x3}, {0x4, 0x1}, {0x6, 0x5}, {0x5}, {0x4, 0x6}, {0x0, 0x5}, {0x4, 0x8}, {0x4, 0x3}, {0x0, 0x7}, {0x5, 0x7}, {0x1, 0x6}, {0x6}, {0x6, 0x3}, {0x1, 0x3}, {0x6, 0x7}, {0x5, 0x2}, {0x4, 0x6}, {0x6, 0x1}, {0x4, 0x9}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}]}]}, {0x98, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x3ff}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x74, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x70, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x3}, @NL80211_TXRATE_HT={0x6, 0x2, [{0x2, 0x9}, {0x5, 0xa}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x200, 0x1ff, 0x9, 0x0, 0xbbaf, 0x1, 0x9, 0xffff]}}, @NL80211_TXRATE_LEGACY={0x1e, 0x1, [0xb, 0x36, 0x5, 0x1b, 0x1e, 0xc, 0xb, 0x24, 0x1, 0x24, 0x1b, 0x36, 0x6, 0xc, 0x24, 0x48, 0x16, 0x1, 0xb, 0x12, 0x36, 0xb, 0x24, 0x18, 0x1, 0x60]}, @NL80211_TXRATE_LEGACY={0xa, 0x1, [0x12, 0x48, 0x36, 0x4, 0x3, 0x3]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x1f, 0x1, 0x4, 0x9, 0x8, 0x1, 0x20]}}]}]}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xcb}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x1000}]}, {0x4}]}, @NL80211_ATTR_TID_CONFIG={0x4f0, 0x11d, 0x0, 0x1, [{0x320, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x304, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xa8, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x100, 0x7fff, 0x7, 0x578, 0x800, 0x80, 0xffff, 0x1]}}, @NL80211_TXRATE_HT={0x38, 0x2, [{0x3, 0xa}, {0x2, 0x7}, {0x3}, {0x0, 0x5}, {0x6, 0xa}, {0x6, 0x7}, {0x1, 0x7}, {0x5, 0x4}, {0x3, 0x8}, {0x7}, {0x7, 0xa}, {0x0, 0x3}, {0x6, 0xa}, {0x2, 0x5}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x5}, {0x5, 0x5}, {0x0, 0x8}, {0x1}, {0x6, 0x9}, {}, {0x0, 0x5}, {0x6, 0x9}, {0x1, 0x7}, {0x6, 0x7}, {0x1, 0x9}, {0x1, 0x5}, {}, {0x2, 0x6}, {0x6, 0x5}, {0x2, 0x3}, {0x6, 0x4}, {0x4, 0xa}, {0x3, 0x8}, {0x2, 0x1}, {0x3, 0x2}, {0x5, 0x7}, {0x6, 0x3}, {0x7, 0x8}, {0x4, 0x4}, {0x0, 0x5}, {0x3}, {0x6, 0x7}, {0x1, 0x5}, {0x1, 0x8}, {0x1, 0xa}, {0x5, 0x8}, {0x6, 0x6}, {0x3, 0x6}, {0x6, 0x2}, {0x2, 0x2}]}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x30, 0xb, 0x60, 0x1b, 0x7, 0x18, 0x1b, 0x48, 0x48, 0x3, 0xb, 0x4, 0x18, 0x2, 0x1b]}, @NL80211_TXRATE_HT={0x25, 0x2, [{0x3, 0x4}, {0x6}, {0x3, 0x3}, {0x7, 0x5}, {0x2, 0x4}, {0x0, 0x4}, {0x1, 0x6}, {0x1, 0x6}, {0x6, 0x8}, {0x7, 0xa}, {0x1, 0x7}, {0x2, 0x1}, {0x2, 0x2}, {0x3, 0x9}, {0x3, 0x9}, {0x6, 0x2}, {0x1, 0x7}, {0x7, 0x6}, {0x1, 0x8}, {0x3, 0x6}, {0x2, 0x5}, {0x3}, {0x7, 0x2}, {0x0, 0x5}, {0x4}, {0x0, 0xa}, {0x7, 0xa}, {0x3, 0x8}, {0x2, 0x6}, {0x1}, {0x0, 0x4}, {0x6, 0x7}, {0x3, 0x6}]}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0xb, 0x48, 0x73, 0x9, 0x24]}, @NL80211_TXRATE_LEGACY={0x7, 0x1, [0x30, 0x36, 0x9]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x38, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x48, 0x24, 0x16, 0x5, 0x2, 0x30, 0x48, 0x0, 0x0, 0xb, 0x18, 0x36, 0xc, 0xc, 0x3, 0x48, 0x18, 0xc, 0x1b, 0xc, 0x5, 0x36, 0x18, 0x48, 0xb, 0x2d]}, @NL80211_TXRATE_LEGACY={0xa, 0x1, [0x36, 0x4, 0x10, 0x16, 0x24, 0x6]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x50, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x26, 0x2, [{0x4, 0x4}, {0x7, 0x9}, {0x5, 0x9}, {0x4, 0x1}, {0x2, 0x1}, {0x0, 0x9}, {0x1, 0x1}, {0x1, 0x3}, {0x1, 0x5}, {0x4, 0x7}, {0x5, 0x6}, {0x2, 0x3}, {0x0, 0x2}, {0x7, 0x1}, {}, {0x5, 0x2}, {0x5}, {0x4, 0x7}, {0x5, 0x9}, {0x7, 0x3}, {0x0, 0x4}, {0x5, 0x3}, {0x0, 0x4}, {0x3, 0x6}, {0x4}, {0x1, 0x3}, {0x0, 0xa}, {0x0, 0x7}, {}, {0x5, 0x9}, {0x1, 0x2}, {0x4, 0xa}, {0x3, 0x2}, {0x0, 0x2}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x80, 0x101, 0x7, 0x7, 0x3, 0x3, 0x7, 0x9a10]}}]}, @NL80211_BAND_2GHZ={0x50, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x14, 0x1, [0x3, 0x4, 0x6e, 0xb, 0x36, 0xc, 0x12, 0x3, 0x18, 0x48, 0x60, 0x24, 0x0, 0x6a, 0x16, 0x9]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x28, 0x2, [{0x7, 0x7}, {0x0, 0xa}, {0x2, 0x8}, {0x5, 0x6}, {0x6, 0x5}, {0x0, 0x9}, {0x2, 0x2}, {0x1, 0x9}, {0x0, 0x6}, {0x1, 0x3}, {0x1}, {0x6, 0x7}, {0x2, 0xa}, {0x6, 0x6}, {0x1, 0x8}, {0x1, 0x4}, {0x0, 0x8}, {0x4, 0x9}, {0x1, 0x5}, {0x7, 0x6}, {0x3, 0x6}, {0x0, 0xa}, {0x6, 0x4}, {0x7, 0x7}, {0x3, 0x4}, {0x2, 0x9}, {0x1, 0x2}, {0x5, 0x1}, {0x0, 0x9}, {0x1, 0x2}, {0x0, 0x9}, {0x3, 0x6}, {0x0, 0x5}, {0x7}, {0x5, 0xa}, {0x1}]}]}, @NL80211_BAND_2GHZ={0x64, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0x3, 0xf2c8, 0xff80, 0x7fff, 0xfffa, 0x1, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8001, 0x0, 0x3, 0x32d2, 0x4, 0xc3d, 0x5, 0x760d]}}, @NL80211_TXRATE_HT={0x14, 0x2, [{0x5, 0x3}, {0x5}, {0x6, 0x1}, {0x4, 0xa}, {0x3, 0x9}, {0x2, 0x7}, {0x7, 0x7}, {0x5, 0x6}, {0x1, 0x2}, {0x4}, {0x4}, {0x1, 0x8}, {0x0, 0x3}, {0x2, 0x8}, {0x2}, {0x4, 0x7}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x7, 0x0, 0x2, 0x7fff, 0x8, 0x6, 0x6]}}]}, @NL80211_BAND_5GHZ={0x3c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x36, 0x24, 0x15, 0xc, 0x16, 0x5, 0x9, 0x6c, 0x36, 0x3, 0x30, 0x3, 0x6c, 0xc, 0x3, 0x6c, 0x1d, 0x48, 0x16, 0x33, 0x6, 0x9, 0x48, 0x2d, 0x36, 0x6c]}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x1, 0x30, 0x2, 0x16, 0x24, 0x5, 0x9, 0x3, 0x24, 0x3, 0x12, 0x48, 0xc, 0x60, 0x0, 0x12, 0x3, 0x1, 0x3]}]}, @NL80211_BAND_2GHZ={0x54, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x3, 0xdfd, 0xfff, 0x7fff, 0x3, 0x800, 0x401]}}, @NL80211_TXRATE_HT={0x2b, 0x2, [{0x7, 0x1}, {0x0, 0x1}, {0x6, 0x4}, {0x5}, {0x2, 0x7}, {0x6, 0x7}, {0x3, 0x5}, {0x4, 0x8}, {0x7, 0x4}, {0x4, 0x1}, {0x4, 0xa}, {0x0, 0x2}, {0x3, 0xa}, {0x1, 0x3}, {0x1, 0xa}, {0x1, 0x1}, {0x7, 0x9}, {0x2, 0x2}, {0x0, 0x4}, {0x4, 0x9}, {0x6, 0xa}, {0x5, 0x6}, {0x7, 0x8}, {0x0, 0x8}, {0x7, 0x7}, {0x1, 0x4}, {0x7, 0xa}, {0x2, 0x8}, {0x2, 0x7}, {0x2, 0x8}, {0x2}, {0x4, 0x1}, {0x6, 0x6}, {0x4, 0x9}, {0x3, 0x5}, {0x5, 0x6}, {0x3, 0x2}, {0x2, 0x9}, {0x1, 0x2}]}]}, @NL80211_BAND_2GHZ={0x68, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x18, 0x1, [0x60, 0x1, 0x2, 0x36, 0x5, 0x6c, 0x12, 0x30, 0x2, 0x30, 0x1, 0x11, 0x18, 0x4d, 0x12, 0x5, 0x30, 0xc, 0x30, 0x6e]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x6d3, 0x20, 0x3, 0x6, 0x3f, 0x1, 0x800]}}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x36, 0x2, 0x4, 0x2, 0x3, 0xc, 0x1b, 0x24, 0x24, 0x30, 0x12, 0x6, 0x1, 0xc, 0x1b, 0x4, 0x0, 0x5, 0x24, 0x36, 0x16, 0xb, 0x30]}, @NL80211_TXRATE_HT={0x12, 0x2, [{0x5, 0x3}, {0x6, 0x6}, {0x7, 0x8}, {0x3, 0x3}, {0x2, 0x6}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x9}, {0x6, 0x9}, {0x0, 0x5}, {0x1, 0x8}, {0x1, 0x5}, {0x2, 0x7}, {0x5, 0x2}]}]}, @NL80211_BAND_6GHZ={0x24, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x16, 0x2, [{0x1, 0x5}, {0x7, 0x3}, {0x4, 0x2}, {0x5, 0x3}, {0x6, 0x5}, {0x3, 0xa}, {0x6, 0x8}, {0x5, 0x2}, {0x1, 0x5}, {0x0, 0x4}, {0x2, 0x4}, {0x0, 0x3}, {0x6, 0xa}, {0x0, 0x2}, {0x4, 0x3}, {0x3, 0xa}, {0x7, 0x2}, {0x2, 0x9}]}]}]}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x10, 0xd, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xa8}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xee}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0x20}]}, {0xf8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0xdc, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0x20, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xb, 0x1, [0x5, 0x3, 0x79, 0x4, 0x0, 0x24, 0x12]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_60GHZ={0xc, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0xa0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xb, 0x1, [0x6c, 0x48, 0x9, 0x3, 0x3, 0x3, 0x1]}, @NL80211_TXRATE_LEGACY={0x22, 0x1, [0x48, 0x9, 0x16, 0x16, 0x60, 0x6c, 0x48, 0x24, 0x16, 0x1, 0x5, 0x30, 0x6c, 0x12, 0x2, 0x4, 0x9, 0xc, 0x1b, 0x16, 0x6, 0x16, 0x24, 0x24, 0x1b, 0xc, 0x6c, 0x6c, 0x24, 0x30]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x1f, 0x2, [{0x1, 0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x1, 0x3}, {0x1, 0x5}, {0x5, 0x7}, {0x6, 0xa}, {0x6, 0x9}, {0x1, 0x8}, {0x1, 0x7}, {0x2, 0x6}, {0x0, 0xa}, {0x6, 0x4}, {0x6, 0x6}, {0x5, 0x7}, {0x1, 0x5}, {0x2, 0x8}, {0x4, 0x6}, {0x5, 0x8}, {0x1, 0x5}, {0x2, 0x4}, {0x7, 0x8}, {0x7, 0x4}, {0x1, 0x5}, {0x7, 0x1}, {0x4}, {0x1, 0xa}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4893, 0x7, 0x2, 0x96, 0x4, 0x3, 0x2, 0x7]}}, @NL80211_TXRATE_LEGACY={0x18, 0x1, [0x12, 0x30, 0x9, 0x9, 0x6c, 0x2, 0x30, 0x60, 0x6, 0x5, 0xc, 0x30, 0x24, 0x0, 0x6, 0x6a, 0x24, 0xb, 0x1, 0x1]}, @NL80211_TXRATE_LEGACY={0x16, 0x1, [0x12, 0x24, 0x60, 0x60, 0x6, 0x18, 0x2, 0x36, 0x18, 0x9, 0x48, 0x60, 0x60, 0x30, 0x6, 0x0, 0x16, 0x4]}]}]}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x60}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x22}]}, {0xa4, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x8}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x8c, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x20, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0xb1, 0x1f, 0x7c3d, 0x3e8a, 0x8, 0x0, 0x9]}}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x6c]}]}, @NL80211_BAND_6GHZ={0x68, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x1ff, 0x9, 0x1f, 0x2, 0x7, 0x1, 0x1]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3}, @NL80211_TXRATE_LEGACY={0x10, 0x1, [0x0, 0x3, 0x36, 0x3, 0x60, 0x1b, 0x0, 0x30, 0x24, 0x1, 0x1, 0x48]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x69, 0x1ff, 0x7, 0x1, 0x6, 0x5, 0x9, 0x8]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x81, 0x3, 0xcc, 0x6, 0x3, 0x9, 0x96, 0x2c]}}]}]}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}]}]}]}, 0xc18}, 0x1, 0x0, 0x0, 0x4}, 0x40049) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x3f}}, './file0\x00'}) sendmsg$NFT_MSG_GETSET(r3, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xcc, 0xa, 0xa, 0x301, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFTA_SET_FLAGS={0x8}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xd}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_USERDATA={0xa0, 0xd, 0x1, 0x0, "ac335f7bff21bfc6e48684e50876a904231f335d910a182044d2e9e0db91736ae9c92b3d51191244ca4953c48b1864f1ce64576c27c12dd6c9960332a6659400acd0bd7415be327c18e89aa6a6d6a40b96088c0b313d5d3ca62874f42876fc2096dcf903c9a0261e264e620ba7a8d1783b43bd5474c23e22a80ff9cca7285f76924ba1e7c1dfff835a26c6504e0969d435a75dfc8d7950fc2b9e994f"}]}, 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x48080) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r4, 0x400454ce, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000600)={{r4}, 0x0, 0x6, @unused=[0xffffffffffffe000, 0x5, 0x6, 0x17], @name="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"}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:13 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xce}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}]}, 0x40}}, 0x10000011) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x3) 06:59:13 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0xd, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x48040}, 0x4000090) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 2071.954096] loop4: detected capacity change from 0 to 573 [ 2071.988900] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:59:13 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b0000f000"], 0x13, 0x1) [ 2072.006938] EXT4-fs (loop4): get root inode failed [ 2072.007366] EXT4-fs (loop4): mount failed [ 2072.025018] loop4: detected capacity change from 0 to 573 [ 2072.041327] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2072.044315] EXT4-fs (loop4): get root inode failed [ 2072.044679] EXT4-fs (loop4): mount failed 06:59:13 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=ANY=[@ANYBLOB="034a8dbd479e1efe8f78383f9ad2b5df8a1b18733a0f960ab837e88c0d1376101f3ef30202036a389b5539c59122f475fbf0410521b8fabfdeeac2b8b03bb8ffdd100ff63890e9542e95cb0ac9064c73d8f701f9f3c442a34f53d2ed76eacd339d0a72d64e1eb0fae5c85b48407203414edbf1f1864a02abcb61711dfbf4b2960261d39e76"], 0x13, 0x1) lsetxattr$security_ima(&(0x7f0000000540)='./file0\x00', &(0x7f0000000600), &(0x7f00000006c0)=@v1={0x2, "4e12d8b65489"}, 0x7, 0x2) r1 = clone3(&(0x7f00000001c0)={0x122b63500, &(0x7f0000000180), 0x0, 0x0, {0x2a}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), 0x0, &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r1, r1], 0x2, {r2}}, 0x58) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x5, 0x3f, 0x6, 0x5, 0x0, 0x2, 0x90151, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x653, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0x8, 0x0, 0x2, 0x8, 0x3, 0x40, 0x2, 0x0, 0x5, 0x0, 0x7}, r1, 0x2, 0xffffffffffffffff, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:59:13 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x88fbffff}}], 0x2, 0x0) 06:59:13 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="73207a304ef3ef99c25d196f751825b12ea7d3e9f87d6b332541bac1eafe5d251bee896b9c37d5a936fab7d1a55e2eb12e64d64f23db2f18a252a598e8976e268362b34b8d5358d576c954a53f1e31bc1fa7c36cf082bb6c05c0dfb508f7ac4ea3a1e28f5c64edcfe1f1cfa0350c14650c3d40e791026b1ee8d5dbd81e65ac6854e4914b4b79fce5bc41b561d7826240c59fe6d7eef9112822648a0e66543371e83660ca6ed2dff4a868684787487724880161cbc1b02ff6a7"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x13, 0x1) 06:59:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x47eb2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 2072.176066] loop4: detected capacity change from 0 to 575 [ 2072.204051] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2072.209286] EXT4-fs (loop4): get root inode failed [ 2072.209987] EXT4-fs (loop4): mount failed [ 2072.231940] loop4: detected capacity change from 0 to 575 [ 2072.252637] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2072.255931] EXT4-fs (loop4): get root inode failed [ 2072.256611] EXT4-fs (loop4): mount failed [ 2086.409975] loop4: detected capacity change from 0 to 588 06:59:28 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b0001ff00"], 0x13, 0x1) 06:59:28 executing program 1: ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, &(0x7f00000001c0)={0xd55, 0x80000001, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) splice(0xffffffffffffffff, &(0x7f0000014200)=0x8, r1, &(0x7f0000014240)=0x167a, 0x100, 0x4) pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000b573bf83b94957dcacaea5993850715948628b81cc44ba72f338aa2dee33215c400bab63c01198a6a471427b716ebfb1252b07e2584ed04b946108d6dfdf58a41c0d6fca6b8e18f4f0225623b9f40216a78209550e6b454628816a8650009ebea58b25846475c9053f258835fa669dc646e494945f23bbdde4a6841536ff12d8f798869ef5e26fdeed51f5472b2b45b4588726712525115495ae94809de44992f714"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:59:28 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x1, 0xcd0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, 0x3, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x20000800) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000026bd7000fd677e6a35000000080039002600000008003400ff01000008000300", @ANYRES32=0x0, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 06:59:28 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x89020000}}], 0x2, 0x0) 06:59:28 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x49902, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:59:28 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="040000004236e80600d5"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, r1, 0x301, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x3, 0x3}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48010}, 0x20004040) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 2086.450683] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:59:28 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="d9ad74bb410f9bb086dc96379d37ac64846818cceaf7c38d2734c2d856a258405d5202aca3f0abd1bd8d1572e3ba4ec388a31c095b873895ca61a3cca942"], 0x13, 0x1) [ 2086.465511] EXT4-fs (loop4): get root inode failed [ 2086.466719] EXT4-fs (loop4): mount failed 06:59:28 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, r0, 0x301, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x3, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) [ 2086.510630] loop4: detected capacity change from 0 to 588 [ 2086.517665] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2086.519356] EXT4-fs (loop4): get root inode failed [ 2086.519709] EXT4-fs (loop4): mount failed 06:59:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 06:59:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x49c02, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:59:28 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x89060000}}], 0x2, 0x0) 06:59:28 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000008"], 0x13, 0x1) 06:59:28 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x501b69ac96f5dca1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) readv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/55, 0x37}, {&(0x7f00000000c0)=""/3, 0x3}, {&(0x7f00000001c0)=""/229, 0xe5}, {&(0x7f00000002c0)=""/220, 0xdc}, {&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000000500)=""/180, 0xb4}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x8) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = clone3(0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r3], 0x1}, 0x58) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r6, 0x400454ce, 0x0) r7 = gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001f00)=[{{&(0x7f0000001640)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f00000017c0)=[{&(0x7f00000016c0)="02", 0x1}, {&(0x7f0000001700)="e38433ced1a7e2439369f6cc0324807ff10b84d703f4a1e9e171405cfddf284996c0f56517c9da0866bb7b287d9d7632c8151cb18ae27ae47046f608d1f82bc82a09779fa63b0dce083c9e672b33cfaa00008b222e9ed0bc64761a9f5ead553c02d6b703946b43690fb6832dc1f7d17fe267abdfc270b265504044dff6d7117a4abe27b9f557be7be29f30f0b159af76b1c4dd6829aac81091933066", 0x9c}], 0x2, 0x0, 0x0, 0x8004}}, {{&(0x7f0000001800)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001880)="99fc089f6e629ed4157a94276c8ba80592b0033fb6b1653297ccb24191b1c5cbd61295465babdaa729a28d5ef355b640fa37a66850f89402ca9597b3c2554238e2648ddca015edab", 0x48}, {&(0x7f0000001900)="7804148f42a02954da40308a185972016906", 0x12}, {&(0x7f0000001940)="e982fcefedb731593b03a384c7ed733f1c48cdf426ff7e6fbcbabf5d9a6c9018042801567127f636871dd271ad6e3957ca58673ee6997c2204860ffa88f0d57767494e9af8d991e3023e7948ad8ee586e72e13395c43a0bd1a7e66d8aa1224b6a3510c6e64c5718fc9983f5431bc0002f5945ff128c86d197b05044222d877427cf2043ca1de4a0ef2bd82a047951eeb0fcf25b22307f1c048e3", 0x9a}, {0x0}, {&(0x7f0000001a00)="8833f6857eea7a9c855d50306144a41eef1723d0a8d7a5c5cdd793bc7a357c67ac78fea617c5475c1a137453bad895814819d6fcf0888ac612b2472c7026b690de837f73001606f119", 0x49}], 0x5, &(0x7f0000001c80)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r1, r0, r0, r1]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [r1, r6, r0]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee01}}}], 0xc0}}, {{&(0x7f0000001d40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001ec0)=[{&(0x7f0000001dc0)="b6e515161f1ed39e49bd72c6c986854e25726ac9684c0615132a1d8228919bf1f3ed7214c0239208db69077c72bbb2077752aa03d0c3a2d5828d339187871d4cbd0729718e701d0da5baca2b70d0a544d37e19cf305c6b08b1f600beea60784b8a74322f481a05656e6056e668815f3d1fa893acd8035cd889164e4e7eea5515a067dec42a329d4827256aafe4004c35dedbae9a5bdc0568249c90099f2f6ada3b5dc2e0e7a4d0c80c3e41cf2161809488f16ecfd6475e8cdaee41c5ec4a6e7d6d", 0xc1}], 0x1, 0x0, 0x0, 0x40}}], 0x3, 0x4008001) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="cbb50672e0000800"/20], 0x13, 0x1) [ 2086.632383] loop4: detected capacity change from 0 to 590 [ 2086.677607] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2086.679381] EXT4-fs (loop4): get root inode failed [ 2086.679742] EXT4-fs (loop4): mount failed 06:59:28 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x892f0000}}], 0x2, 0x0) 06:59:40 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) close(0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:59:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, 0x0, 0x0) 06:59:40 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xdc050000}}], 0x2, 0x0) 06:59:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4b27e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:59:40 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@l2, &(0x7f0000000000)=0x80, 0x80000) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x38}, 0x1, 0x0, 0x0, 0x40080}, 0x40000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)=ANY=[@ANYBLOB="440fbd213b00000000000040c7c005a66b85a513c5c700f57b9766071ef8e437899e1c9d0f626d46baed"], 0x13, 0x0) 06:59:40 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x1) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xb0, 0x0, 0x200, 0x70bd26, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x4792}, {0x6, 0x16, 0x200}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x401}, {0x8, 0xb, 0x8001}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xd8a3}, {0x6, 0x16, 0x1000}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xc6f}, {0x8, 0xb, 0xfffff517}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000080}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = open(&(0x7f0000000540)='./file0\x00', 0x6000, 0x120) utimensat(r3, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={{0x0, 0xea60}, {0x0, 0xea60}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz0'}, 0x4) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x48, r4, 0x200, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x9}, @NL80211_ATTR_PMKID={0x14, 0x55, "1945a3004863ec5cb5cd22e4d51e2e18"}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x35}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x1f}]}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x40001) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:40 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000020"], 0x13, 0x1) 06:59:40 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80848, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000001480)=ANY=[@ANYBLOB="ac6fe521873889a4f9f3c0223ed5c21428dbc25ee7e8a8ad3199ca0000c2201c57cdd3ef205d728891df0e500b2dc53ed11e828b60bcc7b09c949d0a391cb343852a438a95e730f32a88b2cbcc0719a610f8cae77e83c9d59d978e0c1b9ccf502e62d2d252ef5bd7816a8424eb38f19795ba9ebc6f5f9a05cd7ca35203bbe77f39b81d39d96cc322994d7645debe38faf93a3b2617261e3ee4a736587b297593355cc66d949f2285729cb92bbd57b3e67f7590a19b950a28b86fd184c8cd336dd0e3580b10e35ea92c39952eecd62077ee63f77aa0c70900"/227], 0x13, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r2, 0x0, r3, 0x0, 0x4, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000280), r0) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r4, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'sit0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x240454c4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000001240)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r6, 0x20, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x7f}}, ["", "", ""]}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r5, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x1c, r6, 0x400, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 2098.766202] loop4: detected capacity change from 0 to 601 06:59:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, 0x0, 0x0) [ 2098.797096] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2098.819489] EXT4-fs (loop4): get root inode failed [ 2098.820296] EXT4-fs (loop4): mount failed 06:59:40 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000, 0x1) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0x7) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 2098.857849] loop4: detected capacity change from 0 to 601 [ 2098.870683] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:59:40 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xe0050000}}], 0x2, 0x0) [ 2098.875002] EXT4-fs (loop4): get root inode failed [ 2098.875711] EXT4-fs (loop4): mount failed 06:59:40 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xfa, 0x1, 0x9, 0x1, 0x0, 0xfff, 0x80000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0x4, 0x43296311, 0x8, 0x16076391a6627841, 0xfffffffffffff60a, 0x5, 0xcd, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0xe, r0, 0x3) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 06:59:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, 0x0, 0x0) 06:59:40 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00fffff0"], 0x13, 0x1) 06:59:40 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='s\x00\x000'], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000080)=0x4) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0)="ecf1e2474e58674a724fc3fc01e2c24133d76203b7f9f18ab005f20ff0c018771658aa88eada8306dfb659c0a5b1a2d196589dcc7ef07753f5cadd6aee12249e9ac9180fb42c92d38b9c18e4e3073d7b72786a8444aaff3d19c1d0023af3961c1f9bd014946c8ed40fc2d1902003c6c1c635b8203e8d2a1d2ad4a6293e62567c532780f39e1c9b565b0598562a34cb36d760fdc1c3ac1f6d3156f9580607e953a523b20812aa49156fd937e23fc0b765eba37e6a00a231d7", 0xb8) recvfrom(r0, &(0x7f0000000280)=""/131, 0x83, 0x10000, &(0x7f0000000340)=@can, 0x80) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[], 0x13, 0x1) [ 2112.217022] loop4: detected capacity change from 0 to 605 06:59:53 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xeffdffff}}], 0x2, 0x0) 06:59:53 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r0, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @void}}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x5080) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="457606c3097e8defc1a06b99"], 0x13, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) 06:59:53 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000840)={'syz0', "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"}, 0x249) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r2 = clone3(&(0x7f00000001c0)={0x122b63500, &(0x7f0000000180), 0x0, 0x0, {0x2a}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r4) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), 0x0, &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000280)=[r2, r2], 0x2, {r3}}, 0x58) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x4, 0x7, 0x80, 0x32, 0x0, 0x1b, 0x10, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x2008, 0x5, 0x0, 0x9, 0x0, 0x80, 0x800, 0x0, 0x0, 0x0, 0x1}, r2, 0x3, r1, 0x1) 06:59:53 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_mount(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x45) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 06:59:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4bb12, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 06:59:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 06:59:53 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 06:59:53 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r1 = getpid() perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x10040, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x1, 0x8}, 0x2040, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x5, 0xf07f, 0x0, 0x0, 0x0, 0xfb}, r1, 0x5, 0xffffffffffffffff, 0x2) [ 2112.255005] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 06:59:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 06:59:53 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) close(0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 2112.268778] EXT4-fs (loop4): get root inode failed [ 2112.269528] EXT4-fs (loop4): mount failed 06:59:53 executing program 7: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080)=0x1, 0x1) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="040337db42efddd0933847"], 0x13, 0x0) 06:59:53 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) [ 2112.313882] loop4: detected capacity change from 0 to 605 06:59:53 executing program 1: syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000080)={0x14, &(0x7f0000000000)={0x0, 0x7, 0x27, {0x27, 0xa, "98af4ca1e1841ef1a394fb8241f74df0afdf98deed437b343d3a139f5940b0e4ac3cef1f04"}}, &(0x7f00000001c0)={0x0, 0x3, 0xbd, @string={0xbd, 0x3, "9df8f81022680b22ebdc0a72a3d167732e81a5b314d6cf23f1176a37518095a4d4465d9f795be3f33417867475bfb65b8e8962b09c4e0e1e997237716b2c78abc79014183d2932956b93cac65b95eb5e7374f645daa4b68ab03bb3bd7319ccb6ab4405601cd8017ea8d695ffa78d7915e274a150692e2cb1d881f1b4302ff13235cb2c4ba59654dac83898f3b85eb2dbc65a6ca94a934182285e026cfd1dc9000e3d2cf0d7a7779648e01dfe2d085b4c9a797754e7d09ccba023b4"}}}, &(0x7f00000004c0)={0x44, &(0x7f00000002c0)={0x0, 0x17, 0x3e, "c3061436eff7828450a9af5206856d8240a2856db86ab2fb3997f137a4234ad54adcba0e19921d3f9fd0735f268bb4fd9a353be37ff09881a25bf6e240c9"}, &(0x7f00000000c0)={0x0, 0xa, 0x1, 0xec}, &(0x7f0000000340)={0x0, 0x8, 0x1, 0xdd}, &(0x7f0000000380)={0x20, 0x81, 0x1, "e7"}, &(0x7f00000003c0)={0x20, 0x82, 0x1, "10"}, &(0x7f0000000400)={0x20, 0x83, 0x3, "612816"}, &(0x7f0000000440)={0x20, 0x84, 0x1, '^'}, &(0x7f0000000480)={0x20, 0x85, 0x3, "bc7d5d"}}) pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 2112.356395] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2112.362986] EXT4-fs (loop4): get root inode failed [ 2112.363817] EXT4-fs (loop4): mount failed 06:59:54 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xffffa888}}], 0x2, 0x0) 06:59:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 06:59:54 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x55c, 0xf, 0xb, 0x301, 0x70bd29, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@generic="8dc6a0c9342268d9d1b945766b48baa193706eef7ac8fcf9729e33d95bd2b9ac24240972b2479962bc9b9ceaf430f5b946f4c93e5ae6c1bf9e7ca7ced113d839c5b7b2d522e1ab8b91e034e46a44e78d7113c1637b7fe958a5fad5eb4c61e0ec73b69281d25aea869dd89f78b83a28ce0ad149f3bb1de9575876604fe7d3c669517e96a28f57e4fea7387a4bf081bf7732feea5b6f6e361c8cbf3b4557372710242e", @typed={0x8, 0x4f, 0x0, 0x0, @u32=0x3}, @typed={0x6a, 0x75, 0x0, 0x0, @binary="3078777fbaa05cf3aa1d78c5c106dc060744ab4302675992bea727fd6bfaad80609d35f8416548b3aab8275bbf7f13a050fe1bedf268dd56793a626a67582d764cc7a66cac5fd2d0516333373fc8e4a87a6d176e54816bd3c71fb487ebfe3f39a041ee26e911"}, @nested={0x207, 0x78, 0x0, 0x1, [@generic="4c6180d806d2fbfdc4e2bd4515d2473daa26b7d5f29e1eb39c2d53c218cc168adefcce3640c4e38217255837b34ec5ea334257303c59c808a01fe67fbbe369f406dd261132b1c791b972d877670c0799e8d96f3a00a19c1c9f18f9b65fc90279539a837805da53b8c69fcf2bee620387e22537ba23b54845f02316e55ad4c4e946", @generic="933852b5a998a0b26d4bbc411eb450b6a3106de21d18f4ce0ffa6c5302803160c0b5df277db89ec7bdd14c676993dd9356269705cefe32d30a83970dd6177c4cb7136e6409b3c6b1bb75a452c5b66e5d9400b9c50049acfb68db4f5543d16c1df4c8578cd6ab2158ee0fcdbd90f08cfe11bed117351a60b8cda1f77e9bac7e98d439ea8d7c4366a8a61b0539b4c29109037438fa80fe4e94e9e903f09ffe2c4e4f81b9f0009c1a291df60ab817a59c986a622cbd54d06bcfa3fb08677da4b147aa0556c27b3e52c0da8e9c16192ae698c47a4b294e550ec26b9701c0dfdda2ae", @typed={0x5, 0x89, 0x0, 0x0, @str='\x00'}, @generic="e786df4aa7d4b395324a90f9f5e69a35a39fa0ebebf80232bcb4b15cfcf7f8b3ed23d9528137186ba7748a4cf0fe4371c1fac43b937944b6e3c0d6a48116d4f0189adeceb633e9b73f90c499677e3803c55cb3918d3a782a42aaa73204ac711330f8ab5cf052264790e5dfb39d98dfbe95b225f70dafdc73e05b0af5a0c4173b6c8d1893b2b2289d9a53d025e9824aa538bc3c11e29ac0560299"]}, @nested={0x227, 0x65, 0x0, 0x1, [@generic="c208f8a291190a4465dfa052ad759b5c9056b04f71cf7eb182b9f9b8e445959735655e3a837964b81fea18bc93090c109221f278b4ead3e7536d156383c56bfcd70fe9779903ec6bbf770f0b0b9a2495b3d4ace797b3954db49bff890eded8949dfd80380d408c1d7e699d05a3df87015a1d7dd3512523f4feab3fc0d26ab4e59cb1ba8e830e29aa7a7fdd4b2af99f2473415d64bb2affe50edd99dd3549d90db95d137028f91c", @generic="617e9ee1214cbac772e9d022a2ee4b0a4dd6a873944cef2bf00ca9e540aa66e5a144fda3c07204d2049403543cf02b77d03debdbbfd6e0335e8a270185cc1b940bd0317970faea01bc63027dd9703c3d8a3b44b6a543ee107050602f163dc05f9e5cd4419f2c4c14cdae10efad0bfe2be0e9ffa9de77ace59981bc8fc346090f8fa4da3d33a565f3f54fc6818a2389361f321d4cd6ad0810bc9ef64dbf0cd1e1e958ca2c6b870211c3ac09a30661a4baf80e5a9f840e99a374ab14e6021706a49b9ca438fcce9e561525d4a6aaee4a3cbd", @generic="83830ac19a218598cf294bc1277d1392454282b2cae5751bd2a3f5a4cd325aed64372634203a0769c0e6486a99b59dfdd04daff59c1dbc81930334241b0852517653964bc067d06b58458decf638cfaaa55001a187ec03a1982ecd3f37237b150e67e78e1ef49247c6fdeaefb364b73091a3", @typed={0x8, 0x86, 0x0, 0x0, @ipv4=@multicast2}, @generic="b08aae9b24e23b809ecdf0cf1875bce1e7ed964274fdd14347356bbc8eaffa8930122bc76b47f0ad42bd2322ed99dc1dbe"]}]}, 0x55c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="e24ebddb423b"], 0x13, 0x0) 06:59:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4bd0c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 2112.507060] loop4: detected capacity change from 0 to 606 [ 2112.519841] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2112.524228] EXT4-fs (loop4): get root inode failed [ 2112.524653] EXT4-fs (loop4): mount failed 07:00:08 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0xfe, 0x20, 0x0, 0x0, 0x572c9145, 0x848, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x10000, 0x7}, 0x0, 0x0, 0x3, 0x0, 0xffffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) r3 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x1c, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file0/file0\x00'}) 07:00:08 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 07:00:08 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="73797ad8dcbf3530"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = clone3(&(0x7f00000001c0)={0x122b63500, &(0x7f0000000180), 0x0, 0x0, {0x2a}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), 0x0, &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r0, r0], 0x2, {r1}}, 0x58) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7, 0x9, 0x8, 0x80, 0x0, 0x7ff, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x4, 0x6}, 0x8, 0x6, 0x5, 0xa, 0x80000001, 0x1, 0x0, 0x0, 0x80, 0x0, 0x3ff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 07:00:08 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000680)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x800400, &(0x7f0000000200)={[{@nr_inodes={'nr_inodes', 0x3d, [0x35, 0x36, 0x6b, 0x32, 0x39, 0x39, 0x33]}}, {@huge_always}, {@huge_always}, {@mode={'mode', 0x3d, 0x3}}, {@size={'size', 0x3d, [0x36, 0x7f, 0x6b, 0x6d, 0x6d, 0x67]}}, {@nr_blocks={'nr_blocks', 0x3d, [0xd, 0x78]}}], [{@obj_role}, {@dont_appraise}, {@uid_lt={'uid<', r0}}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'security.evm\x00'}}]}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x13, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140), &(0x7f0000000300)='./file1\x00', 0x8, 0x0) 07:00:08 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xffffca88}}], 0x2, 0x0) 07:00:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4be0c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 07:00:08 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 2127.369910] tmpfs: Bad value for 'nr_inodes' [ 2127.370784] loop4: detected capacity change from 0 to 607 [ 2127.387109] tmpfs: Bad value for 'nr_inodes' [ 2127.389604] Zero length message leads to an empty skb [ 2127.400577] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 07:00:09 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) [ 2127.412507] EXT4-fs (loop4): get root inode failed [ 2127.413438] EXT4-fs (loop4): mount failed [ 2127.446068] loop4: detected capacity change from 0 to 607 [ 2127.468647] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2127.480511] EXT4-fs (loop4): get root inode failed [ 2127.481367] EXT4-fs (loop4): mount failed 07:00:09 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xffffdd86}}], 0x2, 0x0) 07:00:09 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x20000000, 0x0, 0x0, 0x3322880, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 07:00:09 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)=ANY=[@ANYBLOB="73e31b1dad3bc4c74f6a92e0689280b2e80e9581df9f13a34a10abb2835ac275e883abf9be1e80bea6502e71363af2aa4be317e2069b1e590204292b36988d7e60109c557c60d6dcb446c0d4f1838b734ddf64d5000000"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:09 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r1, 0x0, r2, 0x0, 0x4, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/170, 0xaa) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 07:00:09 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x61, 0x0, 0x80800, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[@ANYBLOB="461c1d720dcc3bf1664c49e700dd74e7c423055fc69e0486d34eafd33a9b90955cd3dbcf95716aa9"], 0x13, 0x1) fcntl$dupfd(r0, 0x0, r0) 07:00:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4bf0c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 2127.683838] loop4: detected capacity change from 0 to 607 07:00:09 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) [ 2127.740922] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2127.743412] EXT4-fs (loop4): get root inode failed [ 2127.744071] EXT4-fs (loop4): mount failed [ 2128.056736] loop4: detected capacity change from 0 to 607 [ 2128.065111] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2128.068240] EXT4-fs (loop4): get root inode failed [ 2128.068889] EXT4-fs (loop4): mount failed [ 2140.181619] loop4: detected capacity change from 0 to 612 07:00:21 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xfffff788}}], 0x2, 0x0) 07:00:21 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c912, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 07:00:21 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000000"], 0x13, 0x1) 07:00:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 07:00:21 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000200)=ANY=[@ANYBLOB="e18e162112aa2000e56ab7c66c3f409b91a2c6cdff183cc5003f64877ca7ba4992f5d7cf22cb19a958de23f586d687167e9f3413412ced271d"], 0x13, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000240)=""/111, &(0x7f00000001c0)=0x6f) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:21 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) r2 = signalfd(r0, &(0x7f0000000380)={[0x9]}, 0x8) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xfe, 0x4, 0xdf, 0x80, 0x0, 0x8, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5c, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x1d80, 0x3ff, 0xfffffffc, 0x5, 0xff, 0x2, 0x1, 0x0, 0x651, 0x0, 0x8}, r1, 0xa, r2, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x4000) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x2041004) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 2140.202546] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2140.205328] EXT4-fs (loop4): get root inode failed [ 2140.205688] EXT4-fs (loop4): mount failed [ 2140.217579] loop4: detected capacity change from 0 to 612 [ 2140.231379] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2140.232906] EXT4-fs (loop4): get root inode failed [ 2140.233361] EXT4-fs (loop4): mount failed 07:00:21 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000003"], 0x13, 0x1) 07:00:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, 0x0, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 07:00:21 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xfffffb88}}], 0x2, 0x0) 07:00:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4db02, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 07:00:21 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a30ac05968253c351a34335015186a042cd98150ee1dc9417f2eacd90ff9484594ca6b1d269af892240fa608d5138bde4a4d15ab5"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) close(r1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:21 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f00000001c0)={0x3, 0xfffffffc, 0x6e, 0x2, 0x7, 0x81}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(r2, 0x5000940b, &(0x7f0000000600)={{r3}, "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"}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:22 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00ffffff"], 0x13, 0x1) [ 2140.349622] loop4: detected capacity change from 0 to 621 [ 2140.365165] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2140.367910] EXT4-fs (loop4): get root inode failed [ 2140.368285] EXT4-fs (loop4): mount failed [ 2140.383300] loop4: detected capacity change from 0 to 621 [ 2140.402692] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2140.404108] EXT4-fs (loop4): get root inode failed [ 2140.404788] EXT4-fs (loop4): mount failed 07:00:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4e504, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 07:00:22 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)={'syz0', "3676496d036aaed6b12342c3a290a9c7b0140b7bc252aa0046beb8cf009153032aed79e342f46207584ba1f498b99cebeee971c2b6f21ff97a5e496b1d4693616c90056f68d129399c4c7c0fdb0bb892e051c3578aabfd3a995ba020b2030c1c9f0da8043a598117e1643499d80a2a5cc8f232b69f714300e05d9a40e49e527a053a855cd833192fd3b45064c2691bf9"}, 0x94) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 2140.499958] loop4: detected capacity change from 0 to 626 07:00:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, 0x0, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 07:00:22 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="3d2d7c8def68ae11eb0e0058ed9d35c564cedf91c68b6766a33c88a2ae525a9a5bcd44e8874574adfed34ba55029b38dbc03d51635614c4c05000000170c67db1f57ac4dfc654d108c8d8e5174eb6863528a1b08e6e181869be2825ef9da5b7e69"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454ce, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000001240)) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x2000, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) io_setup(0x1f, &(0x7f0000000640)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000600)="81", 0x1}]) recvfrom(r2, &(0x7f0000000240)=""/127, 0x7f, 0x20, &(0x7f00000002c0)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x2, 0x7fff}}, 0x80) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r3, 0x0, r4, 0x0, 0x4, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) openat(r3, &(0x7f0000000340)='./file0\x00', 0x101000, 0x0) [ 2140.526168] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2140.529876] EXT4-fs (loop4): get root inode failed [ 2140.530248] EXT4-fs (loop4): mount failed 07:00:22 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00ffffff"], 0x13, 0x1) 07:00:35 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xfffffdef}}], 0x2, 0x0) 07:00:35 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00ffffff"], 0x13, 0x1) 07:00:35 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=ANY=[@ANYBLOB="61dc4f6a55b4fb0b120bb023f2e8a85b42c1967bf6dc1fc78d746c57cf7343d9409529c8455bf483d4cd0bf058d2e238984e51a99952d5bed1c4d1617adfe4268a8946eeca561ae708934ce3feafed66395de210d975875f1e5bb7dc321203bc08ce3130ce0ad772ce85120949fb2e0b76bc378c8144056602b9650051438e4dc0632964df21f1a03c7684c3cc9e4ee88ef2cbb1a237884773177af85bca9a8bebe9ce30f43811b6639f4d0b13bbfe74ea230aae2607a5af305043dc4bc9"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:35 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d458bd00", @ANYRES16=0x0, @ANYBLOB="00082cbd7000fcdbdf250e00000008000600010000000800060000000000680003800800010001000000080003000400000014000600fe8000000000000000000000000000bb05000800090000000600040008000000140002006272696467655f736c6176655f30000014000600fc00000000000000000000000000000008000500ac1414aa2c000280080004002e00000008000800ffffffff05000d0000000000080006004000000008000500ffffffff1c00028006000f000500000008000300040000000800080000010000"], 0xd4}, 0x1, 0x0, 0x0, 0x1}, 0x4040804) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r3, 0x400454ce, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r4, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYRES16=r4, @ANYRESOCT, @ANYBLOB="43d89b885ceffaa6c93cab80592bfc8997", @ANYRESOCT, @ANYRES16=r2, @ANYRESDEC], 0x13, 0x0) 07:00:35 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="6a697a304b09695e789200"], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x2, 0x9c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000001c0), 0xe}, 0x4108, 0x6, 0xfffffffc, 0x2, 0x6, 0x1, 0x6, 0x0, 0x6, 0x0, 0x7ff}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, 0x0, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 07:00:35 executing program 1: pipe2(0x0, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1f, 0x204000) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)={'syz1', "88026ba9016b6d051ee5d3d263785de92a001f034fd762221b7ec7526ffc9ec8564a98767160786fe154b7514d59fac073ea79eb2a245f32a7ba63c96d86f03739d3270d287b600e11d761e95dd5a1732589129bcaed5668e8963a154a4405d73a259c164911746085eb837334318d5955d41938b258bac55b02b8b109710a277e548235885b9faf3b4e47d91064a5720b677ebc8cf00af436bcb098e06e631de69b615c9f672638"}, 0xac) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 07:00:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4feff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 2153.845414] loop4: detected capacity change from 0 to 639 [ 2153.858412] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2153.860044] EXT4-fs (loop4): get root inode failed [ 2153.860485] EXT4-fs (loop4): mount failed [ 2153.878286] loop4: detected capacity change from 0 to 639 [ 2153.895615] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2153.897126] EXT4-fs (loop4): get root inode failed [ 2153.897523] EXT4-fs (loop4): mount failed 07:00:48 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x36, 0x6, 0x3, 0xff, 0x0, 0x8000, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}, 0x50300, 0x6, 0x1f3, 0x6, 0x100000000, 0x5, 0x401, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x5, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=ANY=[@ANYBLOB="539bde085d08823d4aca7e028c6a171c99fc62f107cd89b62ee6"], 0x13, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f0000000600)={{r0}, "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"}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:48 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) pidfd_send_signal(r0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 07:00:48 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x2, 0x4, 0x9, 0x20, 0x0, 0xfffffffffffffff7, 0x880, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={&(0x7f0000000340), 0xa}, 0x71, 0xfffffffffffffff7, 0x101, 0x3, 0x6, 0xa7a6, 0x3, 0x0, 0x1, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x18) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="000229bd7000fcdbdf2541000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) perf_event_open(&(0x7f0000000600)={0x3, 0x80, 0x9, 0x4, 0x1, 0x1, 0x0, 0xe000000000000, 0xa00, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0xffff}, 0x10820, 0x100, 0x8, 0x0, 0x4, 0x4, 0x98d5, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$NL80211_CMD_TDLS_OPER(r3, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x54, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x54}}, 0x24048000) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:00:48 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00ffffff"], 0x13, 0x1) 07:00:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4fffe, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 07:00:48 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x2, 0x0) 07:00:48 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x800, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) 07:00:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x0, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 2166.568318] loop4: detected capacity change from 0 to 639 07:00:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x0, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) [ 2166.606990] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2166.618996] EXT4-fs (loop4): get root inode failed [ 2166.619804] EXT4-fs (loop4): mount failed [ 2166.653300] loop4: detected capacity change from 0 to 639 07:00:48 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00ffffff"], 0x13, 0x1) 07:00:48 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_BSS_HT_OPMODE={0x6}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x1}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004880}, 0x4000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 2166.694552] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2166.702530] EXT4-fs (loop4): get root inode failed [ 2166.703250] EXT4-fs (loop4): mount failed 07:00:48 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x4000000000000}}], 0x2, 0x0) 07:00:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x0, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 07:00:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) [ 2166.950704] loop4: detected capacity change from 0 to 2048 07:00:48 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x8000000000000}}], 0x2, 0x0) [ 2166.986424] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2167.006187] EXT4-fs (loop4): get root inode failed [ 2167.006909] EXT4-fs (loop4): mount failed 07:00:48 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00ffffff"], 0x13, 0x1) 07:00:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 07:00:48 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000001c0)={0x6, {{0xa, 0x4e20, 0x3f, @rand_addr=' \x01\x00', 0x8000}}, {{0xa, 0x4e20, 0x7, @private1, 0x7}}}, 0x108) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0xfff, 0x9, 0x1, 0x8, 0x9, "fdb4db9ee05622199cb6e70ed548bab70172cb"}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'netdevsim0\x00'}) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r3, 0x400454ce, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000300)=ANY=[@ANYRES16=r2, @ANYRESOCT=r3, @ANYRES64, @ANYRESDEC=r0], 0x13, 0x2) write(r0, &(0x7f0000000080)="a1af218255bfdfa308a271e53593ed2b9d51add37991127df09db545cced60f57003ec54e79041a1d387b786d95f3d3170cdee6a2d2c927f0fc8356cfd59f1c6de9d77b65eb1bdc96a2f94cfc8010c42c12084be", 0x54) 07:01:01 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="abffffe3", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25450000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e0002000000080001007063690011000200303030303a30303a31302e300000000008008e00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e0003000000080001007063690011000200303030303a30303a31302e300000000008008e0002000000"], 0xac}, 0x1, 0x0, 0x0, 0x24004000}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x2001020, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b"], 0x13, 0x0) 07:01:01 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x40030000000000}}], 0x2, 0x0) 07:01:01 executing program 1: pipe2(0x0, 0x0) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x5, 0xffffff85, 0x1, 0x400, 0x5, "5ebeb9b03dbdbbe2e96cfbd6ecc35c537b425d"}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)=ANY=[@ANYBLOB="59200f70821d5db1be8769160444b4fbd4764650826b32de8b53a05bb4f6c4d8f2a7639c0b015dc2d06bfd7ac04f11ec19f3d3180ec9418e0500000000000e00bfd4e2caa152ae3bf4ed7192429d6133d5b85433f275e9017a9e2be81d2e46cf135eea6b6453d0b07567c70e609d042dde41d8f0c1bcebcaab42759f484e"], 0x13, 0x1) 07:01:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 07:01:01 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) mount(&(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='dax\x00', 0x4000, &(0x7f0000000280)='+$%\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:01:01 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00000001"], 0x13, 0x1) 07:01:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 07:01:01 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x8, 0x0, 0x80, 0x0, 0x9, 0x44400, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x8}, 0x4010, 0x9, 0x65, 0x4, 0x3, 0x7f, 0x9, 0x0, 0x7, 0x0, 0xffffffffffffe8dc}, 0xffffffffffffffff, 0x8, r1, 0xa) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 2180.131103] loop4: detected capacity change from 0 to 16384 [ 2180.148790] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2180.150168] EXT4-fs (loop4): get root inode failed [ 2180.150510] EXT4-fs (loop4): mount failed [ 2180.160981] loop4: detected capacity change from 0 to 16384 07:01:01 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b0000f0ff"], 0x13, 0x1) [ 2180.175239] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2180.177394] EXT4-fs (loop4): get root inode failed [ 2180.177762] EXT4-fs (loop4): mount failed 07:01:01 executing program 1: pipe2(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x880, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz1'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 07:01:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r2, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8}, @val={0x8, 0x3, r1}, @val={0xc}}}}, 0x30}}, 0x0) 07:01:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 07:01:01 executing program 7: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000080)=ANY=[@ANYBLOB="44554fc348a96c4de8ead318de2821542e5efdf9c26de3ebc4bf5e4fe7f0c52e56c45e05f7b902fd3f8e5daa60fb3d06a4e5df968e38d8a00746096aafe62e480e4e0341cd95436f4bdeb51a887dc659d060e19277c4f6efe49e4d3829fe3e18b76285ffae061537900eae5e90fbf970dc6261c43c862d0fcd7a8d9f"], 0x13, 0x0) 07:01:01 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x2, 0x0) 07:01:01 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r1, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x800, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x30}, @void, @void}}, ["", "", "", ""]}, 0x1c}}, 0x4000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 2180.305783] loop4: detected capacity change from 0 to 32768 07:01:01 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f0000000200)=ANY=[@ANYBLOB="27430771643f614ddb339da83e5fbce5fd36c6238866877d907a"], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) [ 2180.348735] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2180.357495] EXT4-fs (loop4): get root inode failed [ 2180.358404] EXT4-fs (loop4): mount failed 07:01:02 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b008bffff"], 0x13, 0x1) 07:01:14 executing program 1: pipe2(0x0, 0x0) lseek(0xffffffffffffffff, 0x6, 0x5) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)={'syz0', "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"}, 0x10c) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r2, 0x400454ce, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) lseek(r1, 0x0, 0x4) ioctl$TUNSETSNDBUF(r1, 0x400454ce, 0x0) sendfile(r0, r1, &(0x7f0000000000)=0x7, 0x3) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 07:01:14 executing program 7: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNSETSNDBUF(r0, 0x400454ce, 0x0) finit_module(r0, &(0x7f0000000000)='!\x00', 0x5) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb42aa"], 0x13, 0x0) 07:01:14 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x240, 0x0) name_to_handle_at(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x2, 0x1ff}, 0x4, 0x9}}, &(0x7f0000000280), 0x400) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, 0x0, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:01:14 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, 0x0, 0x0) r1 = clone3(0x0, 0x0) clone3(&(0x7f00000004c0)={0x24000, &(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000440), {0x2c}, &(0x7f0000000340)=""/179, 0xb3, &(0x7f0000000640)=""/81, &(0x7f0000000480)=[r1], 0x1}, 0x58) perf_event_open(&(0x7f00000001c0)={0x0, 0xb5, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff}, r1, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x280440, 0x0) ioctl$HIDIOCAPPLICATION(r2, 0x4802, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) 07:01:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r1, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) [ 2192.575983] loop4: detected capacity change from 0 to 32896 07:01:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 07:01:14 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b008cffff"], 0x13, 0x1) 07:01:14 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x400000000000000}}], 0x2, 0x0) [ 2192.601108] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2192.607441] EXT4-fs (loop4): get root inode failed [ 2192.607817] EXT4-fs (loop4): mount failed 07:01:14 executing program 1: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@private0}}, &(0x7f0000000080)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f00000000c0)=@v3={0x3000000, [{0x9, 0x7}, {0x4, 0x9}], r1}, 0x18, 0x2) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) 07:01:14 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00e4ffff"], 0x13, 0x1) 07:01:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r1, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) [ 2192.698021] loop4: detected capacity change from 0 to 32896 [ 2192.789290] EXT4-fs error (device loop4): ext4_ext_check_inode:520: inode #2: comm syz-executor.4: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 2192.791818] EXT4-fs (loop4): get root inode failed [ 2192.792212] EXT4-fs (loop4): mount failed 07:01:14 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x2, 0x0) 07:01:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000040000d7f46501000000f4655f0000000000007eb26c0000689d981291dcce", 0x24, 0x1500}], 0x0, &(0x7f0000012800)=ANY=[]) 07:01:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r1, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 07:01:14 executing program 6: pipe2(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB="040ebddb423b00f6ffff"], 0x13, 0x1) 07:01:14 executing program 1: pipe2(0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0'}, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x30, r3, 0x1, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x80}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x88, r3, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xffff7fff, 0x3d}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x5}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x5f}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x5b}, @NL80211_ATTR_MESH_CONFIG={0x3c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x4}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5, 0xe, 0x1}, @NL80211_MESHCONF_RSSI_THRESHOLD={0x8, 0x14, 0xffffffffffffffba}, @NL80211_MESHCONF_HT_OPMODE={0x6, 0x16, 0x3}, @NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0xe3}, @NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x39}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xf}]}, 0x88}, 0x1, 0x0, 0x0, 0x4044040}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz0'}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x13, 0x1) [ 2337.166328] INFO: task syz-executor.7:11883 blocked for more than 143 seconds. [ 2337.167315] Not tainted 6.4.0-next-20230703 #1 [ 2337.167775] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2337.168498] task:syz-executor.7 state:D stack:26992 pid:11883 ppid:267 flags:0x00000004 [ 2337.169283] Call Trace: [ 2337.169520] [ 2337.169737] __schedule+0x9a9/0x2b00 [ 2337.170107] ? __pfx___schedule+0x10/0x10 [ 2337.170530] ? __schedule+0x9b1/0x2b00 [ 2337.170896] ? __pfx_perf_trace_lock+0x10/0x10 [ 2337.171358] schedule+0xdb/0x1a0 [ 2337.171690] schedule_timeout+0x3b0/0x400 [ 2337.172068] ? __pfx_schedule_timeout+0x10/0x10 [ 2337.172523] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2337.173076] ? __pfx_lock_release+0x10/0x10 [ 2337.173497] ? do_raw_spin_lock+0x125/0x270 [ 2337.173895] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 2337.174357] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 2337.174841] __wait_for_common+0x1d3/0x550 [ 2337.175256] ? __pfx_schedule_timeout+0x10/0x10 [ 2337.178861] ? __pfx___wait_for_common+0x10/0x10 [ 2337.179322] ? do_raw_spin_lock+0x125/0x270 [ 2337.179724] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 2337.180202] init_module_from_file+0x300/0x6b0 [ 2337.180629] ? __pfx_init_module_from_file+0x10/0x10 [ 2337.181095] ? lock_acquire+0x19a/0x4c0 [ 2337.181517] ? xfd_validate_state+0x51/0x170 [ 2337.181957] __x64_sys_finit_module+0xee/0x160 [ 2337.182409] do_syscall_64+0x3f/0x90 [ 2337.182770] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 2337.183277] RIP: 0033:0x7f91bc687b19 [ 2337.183613] RSP: 002b:00007f91b9bfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 2337.184317] RAX: ffffffffffffffda RBX: 00007f91bc79af60 RCX: 00007f91bc687b19 [ 2337.184969] RDX: 0000000000000005 RSI: 0000000020000000 RDI: 0000000000000003 [ 2337.185619] RBP: 00007f91bc6e1f6d R08: 0000000000000000 R09: 0000000000000000 [ 2337.186279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2337.186897] R13: 00007fff8115f58f R14: 00007f91b9bfd300 R15: 0000000000022000 [ 2337.187574] [ 2337.187797] [ 2337.187797] Showing all locks held in the system: [ 2337.188367] 1 lock held by rcu_tasks_kthre/12: [ 2337.188785] #0: ffffffff8560aaf0 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x31/0xd30 [ 2337.189691] 1 lock held by khungtaskd/25: [ 2337.190065] #0: ffffffff8560b6c0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x340 [ 2337.190927] 1 lock held by in:imklog/190: [ 2337.191329] #0: ffff88800f1b1c48 (&f->f_pos_lock){+.+.}-{3:3}, at: futex_wake+0x1c0/0x4a0 [ 2337.192110] [ 2337.192304] ============================================= [ 2337.192304] VM DIAGNOSIS: 07:03:39 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffff888015b2fc18 RCX=0000000000000001 RDX=1ffff11002b65e8e RSI=ffff888015b2fbe8 RDI=ffff888015b2f470 RBP=ffff888015b28000 RSP=ffff888015b2f3f0 R8 =0000000000000001 R9 =ffff888015b2f4a0 R10=0000000000038001 R11=0000000000023c88 R12=ffff888015b2f4c0 R13=ffff888015b2f4a8 R14=ffff888015b2fbe8 R15=ffff888015b2f460 RIP=ffffffff81133c36 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa0b6fc3900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa0b645ade0 CR3=00000000164c2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffffffff XMM01=30306234386136303638616663356134 XMM02=38303062343861363036386166633561 XMM03=2f6c616e72756f6a2f676f6c2f6e7572 XMM04=71c99fb3f2f4c7bf0000000000320830 XMM05=d3fdd5f48436fbd700000000000aead0 XMM06=e46eaf09c04777b000000000000ae988 XMM07=00000000000000000000000000000000 XMM08=44495f474f4c5359530069253d595449 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000035 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff825166e5 RDI=ffffffff87f7f7a0 RBP=ffffffff87f7f760 RSP=ffff8880090af8e8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000035 R11=0000000000000001 R12=0000000000000035 R13=ffffffff87f7f760 R14=0000000000000010 R15=ffffffff825166d0 RIP=ffffffff8251673d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000563c50ebb618 CR3=0000000009b52000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=002602fe016c6c6f502e726567616e61 XMM02=20726f747563657865110a0100010101 XMM03=67206365786508007374726174736572 XMM04=650e007a7a7566206365786509006e65 XMM05=650a006574616469646e616320636578 XMM06=20636578650a00736465657320636578 XMM07=6169727420636578650b006c61746f74 XMM08=650800737472617473657220726f7475 XMM09=7566206365786509006e656720636578 XMM10=616469646e616320636578650e007a7a XMM11=0a00736465657320636578650a006574 XMM12=636578650b006c61746f742063657865 XMM13=696d20636578650d0065676169727420 XMM14=616d7320636578650a00657a696d696e XMM15=000073746e696820636578650a006873