r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:21:56 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x500) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:21:56 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.log\x00', 0x240, 0x190) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x80, 0x1, 0x2, 0x1, 0x0, 0x4, 0x40020, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000000c0), 0x8}, 0x180, 0xffffffffffff4930, 0x2, 0x1, 0x0, 0x20, 0xca8, 0x0, 0x10b6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r4, 0x4) r5 = socket$inet(0x2, 0x6, 0x7) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r5, 0x40089413, &(0x7f0000000040)=0x6451) r6 = dup2(r3, r2) getpid() r7 = signalfd4(r6, &(0x7f0000000300)={[0x2]}, 0x8, 0x0) fcntl$getown(r7, 0x9) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r8 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r8, 0x0) 14:21:56 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:21:56 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x5, &(0x7f00000001c0)={0x1f, 0xffffffff, 0xff}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:21:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="2000d2110002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:21:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:21:56 executing program 1: r0 = syz_io_uring_setup(0x137, &(0x7f00000001c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2}, 0xfffffff7) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5}, 0x0) syz_io_uring_setup(0x3514, &(0x7f0000000040), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000480)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index, 0x0, 0x0, 0xffffffff}, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000001, 0x80010, r0, 0x8000000) syz_io_uring_submit(r4, 0x0, &(0x7f0000000140)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x1) r5 = syz_io_uring_setup(0x650b, &(0x7f00000001c0), &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000280)=0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r5, 0x8000000) syz_io_uring_submit(r7, r6, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r8, &(0x7f0000000680)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000640), 0x1, 0x1}, 0xd1) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x143100, 0x8) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r9, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r9, 0x3, 0x0, 0x3) syz_io_uring_submit(r7, r8, &(0x7f00000002c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r9, &(0x7f0000000100)=0x80, &(0x7f0000000240)=@un=@abs}, 0x9) [ 2699.641781] loop6: detected capacity change from 0 to 4 [ 2699.647061] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2699.655730] loop6: detected capacity change from 0 to 4 [ 2699.658033] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2699.706790] audit: type=1400 audit(1672582916.329:24): avc: denied { create } for pid=18833 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 2699.711267] tmpfs: Unknown parameter 'bond_slave_1' 14:21:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000180002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:21:56 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2699.797484] loop6: detected capacity change from 0 to 4 [ 2699.818811] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2699.829274] loop6: detected capacity change from 0 to 4 [ 2699.842152] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2699.843067] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:21:56 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000140)) r5 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r5, 0xc, 0xffffffffffffffff, 0x9) ptrace$getsig(0x4202, r5, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x6}}, './file0\x00'}) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:21:56 executing program 1: setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0xc4) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, 0x0, 0x24004001) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000001c0)) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0x0, 0x9}, 0x8, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000080)=0x7) r3 = clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)=ANY=[@ANYBLOB="14fd7960e5a6729f00000000", @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="eeafb164dd72000000000000"]) r6 = gettid() r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r7, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r7, 0x3, 0x0, 0x3) kcmp(r3, r6, 0x5, r7, r5) syz_io_uring_setup(0x38e7, &(0x7f0000000100)={0x0, 0x7c94, 0x10, 0x3, 0x3e0, 0x0, r4}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000200)) [ 2699.911212] tmpfs: Unknown parameter 'bond_slave_1' 14:21:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="2000001c0002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:21:56 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:21:56 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2699.979452] loop6: detected capacity change from 0 to 4 14:21:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:21:56 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x600) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2700.004307] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2700.109436] tmpfs: Unknown parameter 'bond_slave_1' [ 2700.260702] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:22:11 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x474800, 0x2) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:22:11 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x2, 0x0, 0x8, 0x5, 0x0, 0x7, 0x408a4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0xd501, 0x8, 0x800, 0xad4c651ca422aec0, 0x0, 0xf86, 0x3, 0x0, 0xfe7, 0x0, 0xfffffffffffffff7}, 0xffffffffffffffff, 0x8, r5, 0xa) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r3) fcntl$lock(r2, 0x7, &(0x7f00000000c0)={0x1, 0x1, 0x8, 0x3, 0xffffffffffffffff}) chdir(&(0x7f0000000140)='./file0\x00') ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x409000, 0x0) bind$unix(r6, &(0x7f0000000380)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:22:11 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x700) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2714.822363] FAULT_INJECTION: forcing a failure. [ 2714.822363] name failslab, interval 1, probability 0, space 0, times 0 [ 2714.823449] CPU: 1 PID: 18889 Comm: syz-executor.2 Not tainted 6.2.0-rc1-next-20221226 #1 [ 2714.824039] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2714.824626] Call Trace: [ 2714.824821] [ 2714.825002] dump_stack_lvl+0x8f/0xb7 [ 2714.825304] should_fail_ex.cold+0x5/0xa [ 2714.825618] ? jbd2__journal_start+0x194/0x6b0 [ 2714.825974] should_failslab+0x9/0x20 [ 2714.826281] kmem_cache_alloc+0x5a/0x410 [ 2714.826605] ? lock_is_held_type+0xdb/0x130 [ 2714.826944] jbd2__journal_start+0x194/0x6b0 [ 2714.827290] __ext4_journal_start_sb+0x4a5/0x6b0 [ 2714.827653] ? ext4_evict_inode+0x919/0x1a60 [ 2714.827990] ext4_evict_inode+0x919/0x1a60 [ 2714.828330] ? __pfx_ext4_evict_inode+0x10/0x10 [ 2714.828688] ? lock_acquire+0x32/0xc0 14:22:11 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x8021, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000000081e9002e2f66696c65310de62f6c17ac0e5d45b6f0a25e8b00"]) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x8a1024, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x24, 0x0) 14:22:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000200002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:22:11 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) (fail_nth: 1) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:22:11 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:22:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 2714.829127] ? __pfx_ext4_evict_inode+0x10/0x10 [ 2714.829539] evict+0x284/0x610 [ 2714.829834] ? __pfx_ext4_drop_inode+0x10/0x10 [ 2714.830197] iput+0x4a8/0x800 [ 2714.830473] dentry_unlink_inode+0x2b4/0x460 [ 2714.830823] __dentry_kill+0x36f/0x5c0 [ 2714.831124] ? dput+0x39/0xe10 [ 2714.831379] dput+0x668/0xe10 [ 2714.831631] __fput+0x3a6/0xa40 [ 2714.831910] task_work_run+0x174/0x280 [ 2714.832217] ? __pfx_task_work_run+0x10/0x10 [ 2714.832561] ? exit_to_user_mode_prepare+0x109/0x1a0 [ 2714.832950] exit_to_user_mode_prepare+0x199/0x1a0 [ 2714.833321] syscall_exit_to_user_mode+0x1d/0x50 [ 2714.833684] do_syscall_64+0x4c/0x90 [ 2714.833981] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2714.834383] RIP: 0033:0x7f750b0d7b19 [ 2714.834662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2714.835966] RSP: 002b:00007f750864d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 2714.836518] RAX: 0000000000000004 RBX: 00007f750b1eaf60 RCX: 00007f750b0d7b19 [ 2714.837050] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 2714.837574] RBP: 00007f750864d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2714.838104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2714.838673] R13: 00007ffca761fc5f R14: 00007f750864d300 R15: 0000000000022000 [ 2714.839201] [ 2714.840080] EXT4-fs error (device sda) in ext4_evict_inode:254: Out of memory [ 2714.889019] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2714.904626] tmpfs: Unknown parameter 'bond_slave_1' [ 2714.913063] loop6: detected capacity change from 0 to 4 [ 2714.929331] EXT4-fs (loop6): invalid first ino: 4114797056 14:22:11 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) (fail_nth: 2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 2714.955509] loop6: detected capacity change from 0 to 4 [ 2714.970743] EXT4-fs (loop6): invalid first ino: 4114797056 14:22:11 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(0x0, &(0x7f0000000640)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r1, r0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000400)='asymmetric\x00', &(0x7f0000000440)=@keyring) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/164, 0xa4) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/164, 0xa4) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000480)='cifs.spnego\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000004c0)="47ed6b51000ab184d2d2b905d2bc94324ad5fa26b2d26dba009328148e2cf0847e12282faf39ca45c49f302a8ff9daea55aec46928f174c6a6428c4fa5741c49bc94c9985b78e1ddc04efaf44fedb314e053bf", 0x53, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = add_key$keyring(&(0x7f0000000300), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r5, &(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x1}, r3) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000140)={'fscrypt:', @auto=[0x33, 0x31, 0x35, 0x30, 0x34, 0x61, 0x34, 0x65, 0x36, 0x34, 0x0, 0xab, 0x62, 0x66, 0x33, 0x5f]}, &(0x7f0000000180)={0x0, "48ed521ff4984fa0951ae43ee42517a8b4b0457c5d25a6687e48335f9db09e310086057c9f428afc3d705740ccdacd18e63d6edd63ca81018714ac25ee48456b", 0x12}, 0x48, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000380)=0x1) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r6, 0x4004662b, &(0x7f0000000340)) 14:22:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:22:11 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:22:11 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r6, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r6, 0x3, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {r6}}, './file0\x00'}) 14:22:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000620002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2715.089301] tmpfs: Unknown parameter 'bond_slave_1' 14:22:11 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x804) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:22:11 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) (fail_nth: 3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:22:11 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x20b00, 0x0) openat(r4, &(0x7f0000000140)='./file0\x00', 0x82000, 0x80) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2715.176130] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:22:11 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4c00, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8e242, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r6, 0x80083314, &(0x7f00000000c0)) [ 2715.308027] loop6: detected capacity change from 0 to 4 [ 2715.311667] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2715.340524] loop6: detected capacity change from 0 to 4 [ 2715.348426] FAULT_INJECTION: forcing a failure. [ 2715.348426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2715.349470] CPU: 1 PID: 18928 Comm: syz-executor.2 Not tainted 6.2.0-rc1-next-20221226 #1 [ 2715.350034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2715.350611] Call Trace: [ 2715.350798] [ 2715.350970] dump_stack_lvl+0x8f/0xb7 [ 2715.351266] should_fail_ex.cold+0x5/0xa [ 2715.351567] _copy_to_user+0x2e/0x150 [ 2715.351857] simple_read_from_buffer+0xd0/0x170 [ 2715.352217] proc_fail_nth_read+0x19c/0x230 [ 2715.352534] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2715.352897] ? security_file_permission+0xb5/0xe0 [ 2715.353273] vfs_read+0x257/0x940 [ 2715.353545] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2715.353900] ? __pfx_vfs_read+0x10/0x10 [ 2715.354198] ? __fget_files+0x270/0x450 [ 2715.354529] ksys_read+0x12b/0x260 [ 2715.354794] ? __pfx_ksys_read+0x10/0x10 [ 2715.355104] ? syscall_enter_from_user_mode+0x21/0x50 [ 2715.355480] ? syscall_enter_from_user_mode+0x21/0x50 [ 2715.355865] do_syscall_64+0x3f/0x90 [ 2715.356155] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2715.356534] RIP: 0033:0x7f750b08a69c [ 2715.356811] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2715.358038] RSP: 002b:00007f750864d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2715.358578] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f750b08a69c [ 2715.359046] RDX: 000000000000000f RSI: 00007f750864d1e0 RDI: 0000000000000006 [ 2715.359505] RBP: 00007f750864d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2715.359979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2715.360452] R13: 00007ffca761fc5f R14: 00007f750864d300 R15: 0000000000022000 [ 2715.360951] 14:22:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 2715.370236] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2715.419273] tmpfs: Unknown parameter 'bond_slave_1' [ 2715.626740] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:22:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:22:30 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x77, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r4, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:22:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x8e, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fallocate(r1, 0x3, 0x0, 0x3) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x6, @empty, 0x10001}}, 0x0, 0x0, 0x50, 0x0, "d07cba80a2da923bf98301433dabcdd1027139e82de0ac287b41750a2620e4b5d21c026d28fef8863ff90972a797730bdfb09bdda343b09a67f233645fee4bd3853730c45df602ffad6b6f03e7b2d83a"}, 0xd8) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r0, 0x3, 0x0, 0x3) syz_80211_inject_frame(&(0x7f0000000300)=@device_b, 0x0, 0x0) syz_80211_inject_frame(&(0x7f0000000000)=@device_b, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/411], 0x174) 14:22:30 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:22:30 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:22:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000670002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:22:30 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x1201) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:22:30 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r2) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x60, r3, 0x400, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x60}}, 0xe5a41e84102aba6c) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r5 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r5, 0xc, 0xffffffffffffffff, 0x9) ptrace$peeksig(0x4209, r5, &(0x7f0000000400)={0x7, 0x1, 0x2}, &(0x7f0000000440)=[{}, {}]) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2734.302936] loop6: detected capacity change from 0 to 4 [ 2734.310672] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 2734.320988] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2734.341195] loop6: detected capacity change from 0 to 4 [ 2734.341763] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 2734.364209] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2734.410435] tmpfs: Unknown parameter 'bond_slave_1' 14:22:31 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:22:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200004800002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:22:31 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) statx(r1, &(0x7f00000008c0)='./file0\x00', 0x6000, 0x8, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x7b, 0xa, &(0x7f00000007c0)=[{&(0x7f0000000300)="cbb6fbd4d1c140080f46b6ef03a46a3c1269d546c72a2ff283a919e5edbd73fbd5c55caf0d58a40e131556a6eb1d9827c1bbe87dfc96420b084b08d97a36bb3f578146165cc3bf15ccf55e6681b677c1a5ba09e25fb5de6fde9cfba467d4b6f6ddee222cdaf77d0d5b60cb74b61882a59ad60a1b604d79801abe807b77ada6f14b6be429f2b7954b19eb89f7771d7b87412d983448d23e7f515bcd3341118670fc68d66d0a7d6f2b127c90627a80634ef954932d4261391c075448e527297f164c7d03c5c5bf3f4c2e1d6c955f43875b08d7", 0xd2, 0xffff}, {&(0x7f0000000140)="c805aaba663330b22038270f63bde4d583994d385d1b98fa2aa76be222b922f5e989dc0048d8cfcbc5b38c8ccb7dc95c", 0x30, 0xfffffffffffffff9}, {&(0x7f0000000180)="29aa737abec4eacee53613ce6cc1d8a2937887b3e5705ffc85057d527e1f3e308cd003c0ad80c421f0357186ff6252c9e3bdb90fb22eefac9d0739e75915d7f7e1dab148ce469c93b354e5", 0x4b, 0x5}, {&(0x7f0000000400)="aa31a3cb1c184d5ded56211bf27dd9c3a6cde62568e8890b00fd90e55cab9806bb2087b6dac5b7abdcba2898483d268422e0fd92985e6cf1a0cd7e817a458a06d08b8e2374ca8a631d3dccfe0e", 0x4d}, {&(0x7f0000000480)="3bc34816a74f002f242e2d8222e947c903a13c65dcdffda031348f886f283591c447fa2f6d290d8e37a9a2816768cc6db886e406989d45ea3162f382e8c9ca23d59146504bc70b29a366dd69cc28e271be40e9f1c9ffcfc2f85e6c4bc11f9be5a4ed9c954862e0108ad1c1d4e9b9819ce9c03a9cadb852956918bbd45502147fc9a62db2f14fc7a7ae86101c21f4980aab2c8b6c69f0f7abfb456885789488b732164387d20bb21010abc8a31bba5814fc8c9757be21f0d513884e1c7d9cb54de402060bd0e9", 0xc6, 0x7018}, {&(0x7f0000000580)="0fd4a7a328bf4ccddaa82f48c729d2bfb340ee671c12aade5e99ea4437acf2f1ffe022686273398a5da53fe440692a1e19315e1a131bbb213be551ad43bc5992b07a61994dead7393f8e7bfba30305497e19ea0cce2a69855b27471ebb42211abbbe18abf56a3a276cf275c0e6b9283becc7f68d089aadc09f6c71f2", 0x7c, 0x101}, {&(0x7f0000000600)="c160bcd0a93fa2e82f36b9a4681370df4b4dc6bd242c8a0e4eb8513a4ce01da46bb73b065a556b65cbdbcdb1c6e45613ec83488a51e3e3b8bff9544d3f7aea4f6a5fa2d92e7bfe43aebaff95b5676cb1c9c776c1f8f5114411511442fc6e81f270d15b3a563c1dd97e42e3e2c3aa262be3c877a601d6cf620d154a6a08845d4e096a1804728ef11535a61e6c45452da28a1116b097623ffbf618", 0x9a, 0x1}, {&(0x7f0000000700)="e9a2c0394b33137e4986a453c501d3a0b5c17cab4f71880b86436c761fb53b2f0d39fafe8c1e946924411cbb7b5e293246", 0x31, 0x5}, {&(0x7f0000000740)="decb012af5a5356773a6abe049271b4eda7f87ac5fe52a77e47fb172c3004f0a2df2c650e4335a07a8b81acea2d1eada170bfc4db317b5c9e58eea53cc28eab233d7f60a45f26e7f7d8155469355c09f13ff4b69ba092a32a361", 0x5a, 0x9}, {0xffffffffffffffff, 0x0, 0x40}], 0x70, &(0x7f0000000a00)=ANY=[@ANYBLOB='init_itable=0x0000000000000101,errors=remount-ro,seclabel,uid=', @ANYRESDEC=r4, @ANYBLOB='l\x00']) r5 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000a80)={0x1, 0x0, [0x0]}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 2734.624039] loop6: detected capacity change from 0 to 4 [ 2734.624505] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2734.646392] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2734.668444] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 2734.671446] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 14:22:45 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x81, 0x3, 0x4, 0x0, 0x3, 0xa0100, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x800, 0x9}, 0x100, 0x0, 0x5, 0x9, 0xf34, 0x1, 0x1ff, 0x0, 0x7, 0x0, 0x5}, 0x0, 0x3, r4, 0xa) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:22:45 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x1800) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:22:45 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'veth0_to_batadv\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000a40)={0x380, 0x0, 0x300, 0x70bd28, 0x25dfdbfd, {}, [{{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1200}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xb0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2b0}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r1}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}]}}]}, 0x380}, 0x1, 0x0, 0x0, 0x20004841}, 0x24000880) r2 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:22:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:22:45 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f00000000c0)=0x7) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:22:45 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:22:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200001d00002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:22:45 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4040}, 0x4000840) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe4, 0x0, 0x0, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:urandom_device_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:modules_dep_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x3b}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'virt_wifi0\x00'}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4010}, 0x49) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 2749.337180] loop6: detected capacity change from 0 to 4 [ 2749.351151] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2749.362902] loop6: detected capacity change from 0 to 4 [ 2749.369995] EXT4-fs (loop6): invalid first ino: 4114797056 14:22:46 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:22:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x521a01, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1a23}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_open(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3, 0x1) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(0x0) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r1, 0xc, 0xffffffffffffffff, 0x9) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r3, 0x3, 0x0, 0x3) clone3(&(0x7f0000000400)={0x8000000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x30}, &(0x7f0000000180)=""/155, 0x9b, &(0x7f0000000240)=""/17, &(0x7f0000000340)=[r1, r0], 0x2, {r3}}, 0x58) 14:22:46 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x10000) fallocate(r4, 0x3, 0x0, 0x3) ioctl$BTRFS_IOC_GET_FEATURES(r4, 0x80189439, &(0x7f00000000c0)) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:22:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200011d20002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2749.459136] tmpfs: Unknown parameter 'bond_slave_1' [ 2749.503835] tmpfs: Unknown parameter 'bond_slave_1' [ 2749.507163] loop6: detected capacity change from 0 to 4 [ 2749.519846] EXT4-fs (loop6): invalid first ino: 4114797056 14:22:46 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:22:46 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x2000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2749.630229] audit: type=1400 audit(1672582966.253:25): avc: denied { checkpoint_restore } for pid=19009 comm="syz-executor.1" capability=40 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 2749.638781] loop6: detected capacity change from 0 to 4 [ 2749.652060] EXT4-fs (loop6): invalid first ino: 4114797056 14:22:46 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x5}, 0x10292}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) r5 = getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) ptrace$setsig(0x4203, r5, 0xf8, &(0x7f0000000140)={0xe, 0x2, 0x9}) socket$unix(0x1, 0x5, 0x0) r6 = openat2(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x43b826ded2625c4e, 0x13, 0x1}, 0x18) write$binfmt_aout(r6, &(0x7f0000003c00)=ANY=[@ANYBLOB="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"], 0x1a20) dup3(r4, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) [ 2749.705523] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:22:46 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x20100, 0x40) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x51000c10) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:22:46 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r3) r6 = pidfd_getfd(0xffffffffffffffff, r2, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x280, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) r9 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000015c0)='./binderfs2/custom0\x00', 0xc02, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r10, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r10, 0x3, 0x0, 0x3) io_submit(0x0, 0x8, &(0x7f0000001980)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000000140)="42ab91bbca22132f0e5b61ba70f4cfdd2e20ccec5980f41ee7ced5f5f749fa73b3fc52673d8e8dd48f61d4a9e3723cf6e1730836651ef34a902899b84cff64e0a951ba07b7fc1a072c01ddf8c20a60d47b6b605fee2949948a82a58e39bbb312b73fde650ec61ece0b2717b4f74f76b5611d2dae9b370c4ac5a4865f69b9f37eea255fc9c2c5be3a9940312f1658412f87b3d62340d0084967c126ef45a1b8e594e7a5574250ce38f0dff5f1484f539b97d34a1ad8ddf21a02d26dcee74e5306", 0xc0, 0x100, 0x0, 0x0, r6}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x5, r0, &(0x7f0000000380)="790237e801a51f25ac5e7fbe1421883a9d6b17ef79bc185869cc0748d2113bcd3a847a0147baa82517f4d968667d881ac4c3fe1a42a3b0c135ede8c5a298f99ca56d0fbe553d9f0c758fa652891c545e7de5e63f5decffc9693c4a0c02e9e48624bd2082cf33be8b7858afeefe47523f99f35d", 0x73, 0xffffffffffff7fff, 0x0, 0x3, r2}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x7, 0x9d, r2, &(0x7f0000000440)="6dacbdf7ca2898788f176899e92cd71832880d7e20c33099e6a3e4fa350e6ef2d299cc1fc7e2c8bbd1784262c58fc401cf8e592a0ef14d22bac90daf7caedd16fed07677ac04de33c2b11b30fa21149c843a3fb236cc98f7227e6b8c701b0a10d520a18ff995a17ee9bf272e260d174e6d295f11bdfe9f0a9e0596e9f92c7a2a2204f23ef2002cde3596cf1384297222e8130a2f0692d184166e31a47b8936f4d5075d556c9fb3b227c20ffb318e8e6ea55ad770bbbcdd41a0ea1d503419803d756df64782d61b0066d3460a694b6459f94ec3269b4bba0340aac86a656fa84ebf60a5d5aa7f511eaaad36a9486adbdc1eb6a3ae0f8f53e530e15def666be7a95ac006e19a7dba54eca95f45d839c8c77226f9bc5caad1e93396cf64b3f059d9f52a4b18def53f9bf945910d44ca98f19860d387d3da9a089936870981939beb188485a8a0c3526b4f686445bcc673829c5e3a2f6a2bee03928c73e1ef34ba54cdb45198f466534bce46be3c95b983cc36c4664247df298824410177fd5ffef7445e71af6459957354b8dd74db142e4d98f1ec4191f8c83d221262803bd5c1239bec45fa5d2eb64c6731fbfcb6c7bad1f2d957a5023f2787a8866f837433c676704a79fc1c1a3c9c55c17357ed9f3170b631854fb04fde63d3770f1345eec666a0b4f6e83d8f25236abe32e32e286dc2906211660b986816c042a6d24fb57999315c56b0239e36a56e4d36bc6c4c52270647c0cf4bd7c7c757d68ee56996594b96a6e48435b459c0e87ae80ffea64eff0ed706ec3bdcd200772299dd0252135a9cfd76ef26bdb81328fa0f1f61c81ab20e87e20b8182a8c564764e527e5a9fe12f5a56045802a37d1bfb255c0ec64deddcdb32725c24ff3aefb241f44a03ac556603e42d25109afa0166a4c707c161ce859d887fa0b27b503c62685922b92b2d1d0e6898456f2c8bef3d435da15071465edb9f7cc7f626d9cad3be6b18c1d890f19468513aa3bd1147d0b496918c82339fcf5c37fabc24daa1ebaa6d8367ca5475a86f774fdd2e13f9a28b933cb810af79abe3fd7b0f143b919c62ad6c641d42caeeb87d05be4a8fd9d03ed761dd241ff409cd126c01e0d6908b9e6ad6ed89c794fd8e42a666d72e9a9de0f731cef053995acc80d0f0b89a6ab1e44e7ea6f50d60b3acb06c8cfb7cadadcce248de2e321040ab857f7aa2e9f586e9768a4871757314697d883cd7956ec4bb268c462211072817b2ae2aecd614eb60d94d679f421727f311679bc0f97f81c085bfe3f545b6398ab708bf1834308970255ba3ac7a530a462943f21ecab9a1a82420953bc78c573ed2c33372bf17631f32925ca43ffaaf7493e31b42f51f890f53259b8d0f5558d6af30642ce1524847b2f59083c691117ec190902f79937f5f8681b1b5634561ea0070181b50265b22c769fddbac9bbea5412c325b7c6c8c9818752735101c2193babd2d46f3164853b30b2753946a6d06e92ca89d359704e38b0a085d40f81a4c3f9284c9aaa5a9b025e5f834900790430a10f51322589c951277ec69856f711ab849d4a3bbbf54801b98c278608f67f0ce24b51f11362b4356c2dc6f78bc33e4b45450032e6bfca925bde592b8b8ecad4c6708ead551fdfa5e809b67ad191d142eee3a9b381b195ec2d8d23d92422c28b174c0d3412f40a8d1ee7556bb013516c7abebb7834107f4267fbf766a22e25b96d567b18ebb3dbf2df8df49811a2d21d0b8e25531a8607e5957d1f1f3123986fbc0cb5e2d48f6104e73575e086419911f730be16cdcfbd9823facdfd271adfa2f709da30a8e69b9c417db4339883a3a6d37520c264f2bf8b1d94db727a48473cd5e7a3e8dc3cbdee43f8d5af363c6a501a650833e21427166f3d55cd3e967929c1cc098c34d313dedddf6a8ae3ceb8dbf1a2531a5bfbb4a0277942f337327ef207693647c8cfd2be1f9bce16c695c795dcf048bb09dd49519434ca404754b768a1b2c7e9dcb4bf4dbf4ad382b13846d7e3d20a25487354b790575a8c761c6ce81bbe9b749e6e8fba7a007054ed2edb1a82b17aac8c718b6331a5feac9cf6ab29e0382802647fd2e806da1d17e9339940ac0c23dc6791b160d95982261a90e3f896b78dcd5b269e63d3c4c16a72d9cf18ebad8ff8fb6b81b6bf21fd1b112aa42d41292d69a0d8520f9177b746b2ab07fbd63e35cbb6dad9b4b20bb1a3ee8fcce1d8879482cb05f7f1d4d675c0d7f7a33a3318b5c91d60b7dd475c354eb05e2873592d6ca16be81c8f318a838a134d36802b43710be1f6ff8a6ebb9a3436ce12cb9f276a19d3258d4bf29aca44b5507e2ac4ebc877bc5dfb137094d504cda7046a5066c3a23b48060a022a18c9c1ec18a080ee5d624477c71dad4293e40bb568e7d735043fbf01c48c2666ffb18387c7e17565ea5769d66039369186794b5c3bcd65d4b28e1f30a6f791089d8a7fdb41f07ef06b1eb23f122eb65ff5a896b4186fb12aa978fc3747a97a9fc463c7fbd3d2dc307b0f8ee112bbe107ade59d4564e664e8d1a2ed05f8a0ae148dbd3e72871eec0c91517a101aba0b98ee6964d86465524147118f92ddb942b6a3c356c0acd8600deabf18c2eb8d6ef3f5b6e460576f46e90b8a587e65af02bd3cbb8059701fb417342a611970308a0f77baa4f2e02d8a058429f27d8330f812ff22b7ea74f640cfe9cf1c92a09ae0ce1d448cfc8d441268d494b46a3c4f0c46341b4127f71ecf689ab5b6626e654757f747504b15ea7c8a6a82455856a4fd07cd77a2c4916a9a3a4f602b63a1ec05795a36f3f279cf5abbadb3174c948fd504b85d1f12f208bdbe9fcc6b68824b2c5b48e4df2743e3a336ea47d3717cc17999e2b6e0ed8bfc31bb5fe1fc40fed800c51c4a8034d3ef8177a5096e0eab9ccc616c8b14686fe797df955e1478692a469cc12aa3e9ac7757041f05c14d08119418b0d7ad0e290061762daea33103b702d4dcbe544ab9339ffddb35d5a736cf52306e7880b389331cc6e206f5ea3524c10fd85de62486b148d170d4f2b32901b831462a55acfec66bcfd14b04dc32354cb9c6ddb284cc5d7dd552a4d504848571569ee53c3036c06cc831e1f56c37839b4194f46979ab403c2c09f69dc2e19fefdad20a9496cb413ded964c7934e2b560873bf435c5803081f4442285a8afa486cfbe1f97622d4eab13335a0112600524aa1985f4237d526f8150db146172947535150ad0f7d7c4c1f0a92ecfaa9f1a040d8dee7c59d5633145fb0ef3c0dd253ef0769fd2482659456bcf1edfde47e22e52eaa7e74035c5bc5a6da49ecb6ffa22e41730f5e5ea1b77c222c134d37bbe7199c1578bb56dea3b1aff29e5eada7e46d738a4aa381d95640afd5a26f86327d70025fbbde599ee2bfe69df0cee8ad3394ebd16d07d4362cdea32faf51d7d24aaa69abb02ba024117b2d150edd28574fbe08d1dae6f5d3c5b68846b77b091f379670d7355939f7db978428a606b1b4a40d7fd155dd9996f6760567b101df36b9f6785870d84c45546c21788c9fc75ead85fb9f3debabbd0f07bb360c53633807294144b1c24b63fa78fb7e7b44d616c5b58b56abdeb324cbb0a47073d72d6b9ec6c7c7555e6d2444f3c72ee87164f8c21c18520a30db46f9d80a61662a5bcd29e99377a925c177104f32ee66b746e1cf6e6a009cae948e3745c16d90d21168c457bc8f66839d98d525209f642a1a4f5585440a23517b19f958b0ceb6ad4c2eb436311c8d98e279f0d19146b58c2853f89339b3a641dcd31cdb15c8e476618d17ffa6960f07cf4aa76dceff447fd3f114d5b7e37b92bca73b745618481e1998859d89ee15857a2fd2a269e6a12be8ff423e7ef9e26ded6bc44ab7f4864958fdc4a1935e349d49ad230d845593e391fbbace581eb23fc4b2015180d1c64fc31b2949f3d7c78ab0839a65320887549cbb4e70189507b52e522f7e961bd53fbc10cade05d2ed4593b6e78c4f0d4ca1f12b684ce77011c21281031e588fc2369dba0136dc5cae6333e4653e1b33bbf024a33a25cb8cedcbf9ac294385d3008cb7982c7006c942d383bb874c5272b3a7fb58bc16a86a9ee400e9b8dfb80d990d1cbb902d642bcfc1a7ae2d59089f0ac480a01ebba02f4110fd77d0adc27f43990b4b38263eb827a99e3898c3b65eb59b7604bb5973b6f56da986c6c99ae14d7b3bbb0ab1ea309fd1705f58eb66f477f6c6fd06f827d492965ed17082780b55275d6570459d39d73c0ccf2aabe7a7c26ff78c92b072006609d3758bc73c34a76bb6dca5237a084a5363d62d2f668faeeea713da321bcdbdbd5d763923abea849174d452be474dee41ad0ae9b4a63d2186f4601e4ab05aaf87dc892decf4010e2cd8aa22e1a557495d0766ed2497e42f89954b40fdd51a475a2043eb217527861f292ccd7b697c4e382ef42425c20117d6a37d4db7c6b2a8f5f84e6b2bbcc64ae0139a1f83defdc80c0845dd800da17ffe05dfd8a8806f5cab07a18738ba6eca6592a989b132495402880ec6029c2836897bdabaa326da66bc38d57e59304730c6043b5b78e9da3a92067eace768fe0c68ca91414fbb0e821aeb6ab809ba1da2c3257a333715b56c74104fa201c82d987e7a55f8a9f8447bb40f28ab3f74cc1e24fc0f8b3947820736537ae359c680b47a5ccbb15d07f59a06fa9f4b8447afadc7872cb06321315237ec2f19a20a4c156d91b712d0b82abbdbac7154a0a82d867a84b902b1a9e5f7f934ff97b24287e5a02792797aff57960e1009b86ef55d34f3a5be9433d49da4f7ddbba81e2afc7c22da779ce51071317d8b5e72bb409840d4e76e5b538ab4f83cacdfdbbb3809673b0c7ce706f4efbfda8d0c63350fd0d81cb90716b4042fd2908f6ddfa26b755fef09cccf553e20154eaeb1524cd59cb4ee21a74bc16d68aee978bf22d0cce4ef2b1fc05103e287be3a7cbe5d64f4020b29235bbfa57b8bcf2ac918c3c0a9c5e222644336d46756c56aece0fc64810cc7a4c9b37c376120ed19eda7eb619d29679428b768ffef3cefb1bc1a447d3b14fcf036677c9c8da6c70b66538bb178bfa673c58d25d738b3c8b1085db291ae607472d201fcb00a8f66c7abd71d3c476b9d7e06166975b10fefcb6fc0c6d4e6e9f29b7dccb6f3834aaafae43e391ffda44bdc067ff1b000925b026e17de5408ae8ef0f62d36e433ffb3de87741218f8621e343505b80cae393bd4c5daccd0bc473540e62e5d8c5e3d4cc7417b30fa1a3f596d67f904eccf4c89f3d37b8e54c9f294881bd64838d18d594442d3d7154ded73586b6f5f1173155ea638e3eadf9716c402c63e432f00ab94c67f593e6b0673001009fb033f14d836d6cb50507d2f732b74cceef5681ebb584d79b3e2988db796437e8357a311c7dd25ef6b011ca8cdf06bd0833051d929cff62f6901ad7b487dc78177b738aa10c1b2751e5c45cf1b82ccedf9c53b8ca528d800ab5e7bbe46deefc8cbaaf5f4864476ef571692086690998d9250b0f7b9454346521a8d549b644f662f29bde91e51a59a2fc281cfaa6cd309b6e312e153ca473287bae8a01e1c1fa709fdee0eeedb6050dc14bb467fdda3ee38b662f2a5336fd45c8c0e57a1e85dd25fa95de3f54b5dd0f9e925574f32ff2cfc2cd989734467ae7b99b85146156f00b7bc58aa030ae4a2b48e17ad8dc15ac6c6c3e9c56b510b85139f22e8fe51d17fad44381fc08522d2e28f4e3bde90b9181fb0086ee768c543abf2bcf38e6234409b433389330907feccffb83442a5b8eaca44c40bbfb0", 0x1000, 0x10000, 0x0, 0x0, r7}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x6, 0x21, r8, &(0x7f00000014c0)="51f6923fede76a025d8ad056a2518b9ab6e2cbb764b129b8f925e13a40761e31612e8e1bc6aa04d3a4e41868491590ee20a3b9087e75b587376e185c27e3fde3ba57ad6772e171a22f9a3073f74a3d652a89532ca88eef309b0a19e6caa32b387e1dad2d6ce476b27f8dcfa167df360c9c369cef585de29258b5cd867accc2f75f7ed37123003f17e552e35b6a1e3f3700dc39a2766b87c79d03dda98d954bf8b31c0b7f54f7da3b40d200bcae88177e0b88d414c0e3774c", 0xb8}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0xd, 0x0, r9, &(0x7f0000001600)="e8ea9f89c89b969d971ec9692bf9e814d3f3088f9d1ff76181acdbcb3c82486b69bddd9a6b5f384b9e1f190c126d1a76c726649fd7566ab056c3420c2a26691ac0ee82057e035fd7af270459baca99ae8ec2eba4de4e0021c2b77d8b760a08a421b724b7f54a28850e5c99a39454463d4af9348a605d8be891367734ef61308f80362ca839397670bf83fede159a25abdd33be326e6d711406576fb02f15e1c5175770137472603bfd537c1197a93a1d97c2c858c1862935f8bf9478f5dff695f2985f89b7da8b5202c4f71836c7e17e17cac71a0069ed8fda660260d7ec34a1232b75ebfcd8f2dad23696", 0xeb, 0x1, 0x0, 0x3}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x2, 0xff, r1, &(0x7f0000001740)="161ff2f19e56c753cbe03dd7b43470bef4d38448eda2d9edf8f87bbb07edc3952102cc0991283a56e8d211c03b4d2fa0def002b02fd7b65b", 0x38, 0x8, 0x0, 0x3, r5}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x5, 0x8000, r10, &(0x7f00000017c0)="30ae44a932f9a939cad381506807c64bc0a3df1cca987aa06ee4f80910c88e3accca929f27b0bd29d5cc5abe7c11947d616a50fc768d85e766156b9887ac325cdf9732e09e95b2c83c06be9116949969c134dcdde0b5f394613a54464a069c7eb1f5c27ae3837dddaf3bc94366b424080845885a6ccd1ab82865bb93ae28a3aa5f8b0c77503e", 0x86, 0xffff, 0x0, 0x1, r5}, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000018c0)="dc91c0a4eb72f71866c5976d348229eddefb330f5436f3387c85b2095910ecb2a0a16ca723e252eb1acd1246569d2ba4007849a8766cd0b806acaea9f906c634b69dde3f74a88ba39f5ac8fb50c8b8431a0eacb47464a66992ccd00c9ef73c031e810706b4faf95a9431aa450a", 0x6d, 0x2, 0x0, 0x2, r3}]) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2749.809044] tmpfs: Unknown parameter 'bond_slave_1' [ 2749.824539] tmpfs: Unknown parameter 'bond_slave_1' 14:23:00 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x2103) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000f60002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:23:00 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:23:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:23:00 executing program 2: fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000140)) socket$unix(0x1, 0x1, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:23:00 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) fdatasync(r0) r1 = socket$inet(0x2, 0x3, 0x7fffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) fcntl$dupfd(r1, 0x0, r2) mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) acct(&(0x7f0000000400)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 14:23:00 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0xfffffffffffffc50, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffc, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) openat(r3, &(0x7f0000000040)='./file1\x00', 0x2b0201, 0x45) socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000048580)={0x6, [], 0xb3, "77d3e4194e4077"}) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r5, 0x3, 0x0, 0x3) pread64(r5, &(0x7f0000000700)=""/4096, 0x1000, 0x0) 14:23:00 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x8, 0x6, 0x20, 0x7fffffff}, {0x0, 0x3, 0x1}, {0xf6a, 0x85, 0x80, 0x3}]}, 0x10) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2763.673006] tmpfs: Unknown parameter 'bond_slave_1' [ 2763.681115] tmpfs: Unknown parameter 'bond_slave_1' 14:23:00 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = dup2(r2, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) [ 2763.714867] loop6: detected capacity change from 0 to 4 [ 2763.732098] Process accounting resumed [ 2763.737741] EXT4-fs (loop6): invalid first ino: 4114797056 14:23:00 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28ab881, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r2, r1) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2763.772967] loop6: detected capacity change from 0 to 4 [ 2763.789794] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2763.811331] Process accounting resumed 14:23:00 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) fdatasync(r0) r1 = socket$inet(0x2, 0x3, 0x7fffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) fcntl$dupfd(r1, 0x0, r2) mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a901e, 0x0) acct(&(0x7f0000000400)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 2763.838357] tmpfs: Unknown parameter 'bond_slave_1' 14:23:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000fc0002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2763.902223] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:23:00 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x13f081, 0xe) r2 = inotify_init1(0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r2, r1) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000180)={'veth1_macvtap\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) fstatfs(0xffffffffffffffff, &(0x7f0000000140)=""/32) [ 2763.914546] Process accounting resumed 14:23:00 executing program 0: r0 = inotify_init() ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x7, 0xfffffffeffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r1, 0x3, 0x0, 0x3) read(r0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r2, 0x0, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r5 = inotify_init1(0x0) r6 = dup2(r5, r4) getpid() ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) openat(r3, &(0x7f00000000c0)='./file2\x00', 0x80, 0x30) [ 2763.985212] tmpfs: Unknown parameter 'tmpfs' [ 2763.997185] tmpfs: Unknown parameter 'tmpfs' [ 2764.013945] loop6: detected capacity change from 0 to 4 [ 2764.018487] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2764.033942] loop6: detected capacity change from 0 to 4 [ 2764.039897] EXT4-fs (loop6): invalid first ino: 4114797056 14:23:18 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0, 0x9, @perf_config_ext={0x7, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x1100410, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:23:18 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f0000000880)={0x13dc, 0x14, 0x1, 0x0, 0x0, "", [@nested={0x13c9, 0x49, 0x0, 0x1, [@generic="e6fdf2a6aa2b192bf2361d8aceb4bfa5cf1eab4fa6f22985630c550225683023439d695c830db29d44d34a8e90d75230d0bc60bbb7bb3d8a73bc17b5d582bfd3286a099a7c4fa94930cd6138a4a0555443a903e940d96ef633ae7687edec7a55ad9664be6f02ce916cfca422b108fd16f3391db087b547798dfcdc4f9f03d772fbe2361c0ecac882935da938a1912a4ad6c32b7ba0b52063c29fe6257c5ccf503710b03e066e5a488f78726210b6d62bfc8633cc6af45493fca379282c5f3b670d1e6e37f8791a055d75fc0813eb8d46e743e1b2341e9c9208d80e8984755c8b9fb0624a32f3e741b58412cfe86b99", @generic="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", @generic="3b5042acae665a957ce0b447f7dde4e1dcbd86971f561a3e898939c9c297585f9af61c4beae93399f1ad1668567e5d018b62d056f16dc6ddb5911b0577802fa73dcf5c131436d939efd1bc40360364ef2dd53ab225d1987f519be58880cde02988a22912758836793d219eb96f42880dd90710e87972f3bcda", @generic="d2ae97abe4d0ffe9b6e1d38990", @generic="5ea43c732855f7e51d6ee9b5cb39b21a54cbc321d82f845e4cb9080cb4be4d0f76de8553babe314186c89d24ac800edebd59cff5d94ee02f0918fe5ed0c5f8359cb84af27cebc7ba7e12cb48832772d570541b93767fd001f60a134910ebdfac427b9b756422019a185e67f84ee65b541057106754c6511ef61961c496968d975bc3998a0b235070150672300d9e88364b5525de561d3b80230d4e8af8e83e0a1bd948d7541a6f3e6516ee879a2536e996971d294ca8fce01437db6fcdc619db7e7db2", @generic="1f57d7120ec7d283443d14b39f1a95c4353253b77f931f44e62a771444c0c4e1134f1568982b938215a3d0ce6a85f54b6214c97e6bc801fc5fd3e7168fdc5685598136b638834064ba45d5cc02a4862c280557d3b810e17b21440586e495a658c82c79e81a", @generic="f75636c4eed5404dee979f688badc3c04e8ffb1f0fe8e8ead0abd721fd68b56ff110a7668f473c1926efa9027dcfd65d002b923f56447989f543f2bd56d60de24492dec6496e24b20c0e0e29a37495beb986104c3330292b89f2f7c51398becf7e", @generic="71a4caf31abb8ad12d7138d85319f6cc427fc023cc95229be39057290860c8cd5eae358038c37829b6a861a8e8fd93eb2df764fef550f70c7d6925925bd006bdf6edee7511cdbe31a78aa887ca3c1bf8947bd71b5b54896ef6081c580ea8c2cf74dfb7e02dfe3949018ad8a9ea6b212ed0f6e8c6a25381905c20591d01d65317bdcdabb3986eb80ff02854fca5", @generic="bc3079c0df4ed6ef5309abc703a112e5af6d37cf6b3db5b06258b2ac1a6799bed1c7dd503668099225656056cd203d93caf3b8e7d3868dabab8d"]}]}, 0x13dc}], 0x1}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0x2, 0xfffffffffffffffc, 0x5}) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f0000000040)) 14:23:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="2000fffe0002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:23:18 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) fstat(r2, &(0x7f0000002ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x6, 0x4, &(0x7f0000000600)=[{&(0x7f0000000380)="f2c5234a0e4f61a3114e6f0c8f21111d7c0ba1e65590245b296f54de47c7ca451ea7cb5c6fd7255d9ed3031ad996a4e3afe90ab4e859584fd24f54cb003b1bea3f2166a6ecffc37e9e5362d167893359fa09bd8d17c00d776ad2e96ea96a99f8aa4487ef0fc1429ac201b6ef8e1f64648b1a5e122e32dfd8fe3bdee0da6a86ec378f8da3dcf831b0b76cfe56cf70cef960ad490686229878d5b6444e84e3e87a8169fcb790617ca3354751053f4f79760bca39a5bff4e5f4d16cf88f9927f02ad67724f8c05a4a57888e8569459e1d1c7c70ff91b8f3bd12dd4882e6beae6632752bffec0f147f45bb396bb1ea9bd6698c49e2528a097cad0a8a875a3d", 0xfd, 0x2}, {&(0x7f0000000480)="7a4f14b3ad9a04daf81ddbb403c3a115f406e69caa64ae7f0f768b66163fd27e9432dd4020e10080fed8d02cc5b4dc112fbca86523765782b3d43ae738edf5190d90e31e1dcd240d8db87c14044e3bb54adf4c7bb1d5af9fa82097c21ae2a1f24f6d4153758db2b8644666b53904187fbaa7755dcb20f4ccae1030153ce36369db9bbe66f8ccad9837d1ec671c5eb54b1c08adc652dcfe2ab870a6dfb39a7fed7a8eeeaa4c", 0xa5, 0x3}, {&(0x7f0000000180)="22a7be3cc81102e1afed9704fe34b332635546995ddd91be2ee3937ca1a4fdf5996524e791f40d64e6703c936e1f0618b34895dd436e335397febf628e25f35c413cd88e162bb7a4240480b8c906748db2ea7491a806ef7da620c1239ac5", 0x5e, 0x6}, {&(0x7f0000000540)="5232de3eda5c0257576776740c8128c6e46e4ca2395eaffc7658fa2275ad2ba9ca8ec7f5198f6ece32bf400a9e0835a7b89b29494c0a8716e5f950b0f5b3d983de5b11b6f72a41b153b56ed928984905ab835dca20e23fc1b93d13cdbcc8f68273c86bc3ca6bf97f2f8c855d05608856e0051430ce3acd6353f3dffe47974bc334ea91b64d98ae", 0x87, 0xfffffffffffffffd}], 0x211424, &(0x7f0000002b40)=ANY=[@ANYBLOB='overriderockperm,uid<', @ANYRESDEC=r6, @ANYBLOB=',appreise_type=imasig,fsname=,bsmagic=0x0000000000000008,\x00']) dup3(r5, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:23:18 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:23:18 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x2400) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:23:18 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x20}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2782.196384] loop6: detected capacity change from 0 to 4 [ 2782.207826] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2782.228208] loop6: detected capacity change from 0 to 4 [ 2782.245379] EXT4-fs (loop6): invalid first ino: 4114797056 14:23:18 executing program 1: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r0, &(0x7f0000000180)='9', 0x1, 0x8040000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400020, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7690}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r1, 0x2) chdir(&(0x7f0000000000)='./file1\x00') 14:23:18 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = inotify_init1(0x0) r3 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r4 = dup2(r1, r3) dup2(0xffffffffffffffff, 0xffffffffffffffff) utimensat(r4, &(0x7f0000001980)='./file0/file0\x00', &(0x7f0000001840)={{0x77359400}, {0x0, 0x2710}}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r5, 0x3, 0x0, 0x3) perf_event_open(&(0x7f00000018c0)={0x5, 0x80, 0x8, 0x0, 0x4, 0x42, 0x0, 0x400, 0x400, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4f, 0x0, @perf_bp={&(0x7f0000001880), 0xc}, 0x10400, 0x1, 0x800, 0x6, 0x4, 0x7, 0x800, 0x0, 0x3, 0x0, 0x5}, 0x0, 0xd, r5, 0xb) dup2(r2, 0xffffffffffffffff) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) chroot(&(0x7f0000001940)='./file0\x00') readv(r0, &(0x7f0000001780)=[{&(0x7f0000000100)=""/146, 0x92}, {&(0x7f0000000380)=""/222, 0xde}, {&(0x7f0000000480)=""/249, 0xf9}, {&(0x7f00000001c0)=""/51, 0x33}, {&(0x7f0000000580)=""/3, 0x3}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/188, 0xbc}, {&(0x7f0000001680)=""/195, 0xc3}], 0x8) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2782.305478] tmpfs: Unknown parameter 'bond_slave_1' 14:23:18 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x18030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000040)={r0, 0x29, 0x1, 0x8}) r6 = openat(r5, &(0x7f00000000c0)='./file0\x00', 0x101480, 0x21) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r8, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r8, 0x3, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r8, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYBLOB="f9ffffff000000002e2f6669ec653000"]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:23:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="2000feff0002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2782.382383] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2782.413373] tmpfs: Unknown parameter 'bond_slave_1' 14:23:19 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:23:19 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x5e01) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:19 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8540, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x5) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 2782.539539] loop6: detected capacity change from 0 to 4 [ 2782.570757] EXT4-fs (loop6): invalid first ino: 4114797056 14:23:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:23:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000003000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:23:19 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000300)="0000200b000000b24343c4a3691653861d596601000000006fd765f84aee44fcf6", 0x21, 0x4e0}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000780)=[{&(0x7f0000000340)="b6", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r1, 0x3, 0x0, 0x3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x808404, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@posixacl}, {@mmap}, {@noextend}, {@cache_none}, {@privport}, {@access_any}, {@mmap}, {@msize}, {@version_u}], [{@dont_measure}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@context={'context', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@pcr={'pcr', 0x3d, 0x21}}]}}) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x10280, 0x0) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000140)={'\x00', 0x5}) 14:23:19 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="050000b4c950bc002e9130696c65310020ca6d1ec51e3ca39f71ca89f3c4838a1b9d1ab9a3756e80b6529f1dc77400ef4e3681cfbba2a8d8785c8abe72c50e020000000000000066bdd789c3c628d140cb8e71f24761c8acc5a6c960a9c22be63371737e0008df"]) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x5, 0x7f, 0x4, 0x8, 0x0, 0x6, 0x41000, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x2400, 0x8001, 0x6, 0x4, 0x4, 0x6, 0xffff, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x6, r0, 0xa) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x29, 0xed, 0x8, 0x2, 0x10, @mcast2, @rand_addr=' \x01\x00', 0x80, 0x40, 0x5, 0x8}}) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000380)={@dev={0xac, 0x14, 0x14, 0x39}, @private, r3}, 0xc) r4 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000500)='./file0/file0\x00', 0x535081, 0x10) r6 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r6, r5) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r7, &(0x7f00000004c0), 0x1000000000000110, 0x41ce0003, 0x80000001) fallocate(r7, 0x3, 0x0, 0x3) dup2(r7, r4) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2782.767046] tmpfs: Unknown parameter 'bond_slave_1' [ 2782.802326] tmpfs: Unknown parameter 'bond_slave_1' [ 2782.882848] loop6: detected capacity change from 0 to 4 [ 2782.919755] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2782.984983] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:23:35 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:23:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:23:35 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) r5 = syz_open_dev$vcsa(&(0x7f00000001c0), 0xfff, 0x80200) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x8, 0x4, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x400, 0x101, 0x10000, 0x0, 0x3, 0x20, 0x5, 0x0, 0x7}, 0x0, 0x9, r5, 0x8) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r4, 0xf501, 0x0) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:35 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x8004) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:35 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x32d1}, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:23:35 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x92000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff0d6, 0xfffffffffffffffb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:23:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x420c, 0x4, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000400)=0x309) r0 = fork() r1 = fork() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) fork() socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) dup2(r2, r3) syz_open_procfs(r0, &(0x7f0000000000)='map_files\x00') perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xd}}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', 0x10080, 0x10c) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_async', 0x0, 0x0) finit_module(r4, 0x0, 0x0) 14:23:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000004000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2799.402017] loop6: detected capacity change from 0 to 4 [ 2799.433855] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2799.470137] loop6: detected capacity change from 0 to 4 [ 2799.490332] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:23:36 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2799.510185] EXT4-fs (loop6): invalid first ino: 4114797056 14:23:36 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x9201) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:36 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000000c0)=0x2) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) write$evdev(r4, &(0x7f0000000100)=[{{0x0, 0xea60}, 0x12, 0x9, 0xdf}, {{0x77359400}, 0x12, 0x1ff, 0x7fffffff}], 0x30) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:36 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) r5 = open_tree(r3, &(0x7f0000000040)='./file0\x00', 0x1000) fspick(r5, &(0x7f00000000c0)='./file0\x00', 0x0) [ 2799.550002] tmpfs: Unknown parameter 'bond_slave_1' [ 2799.591002] tmpfs: Unknown parameter 'bond_slave_1' 14:23:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000005000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:23:36 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000000380)={0x19f, 0x200, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/consoles\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:36 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2799.731074] loop6: detected capacity change from 0 to 4 [ 2799.751598] EXT4-fs (loop6): invalid first ino: 4114797056 14:23:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f8", 0x16}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000011300)) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1f, 0x5, &(0x7f00000013c0)=[{&(0x7f0000000240)="df97aa3231b2c166231de8224a6df515057fc1a4f8f055008acf32b9c57cbae3ce514f0144a9c1b55f169adc94537b7d5852556fd2a46efa2e4eeb1d6977de86e8382eb0924da49d81134608a55830a0b8d57247ebd6c6751d9e3dd36f11d2db0399282b3a398d6fa7f0db13312a684faf7d55e94e83b0dcfa6aab87d5085d462ec4be1fd41703b45191c84a8642cd6d5c8b76f4c7b4c3de61d114835f270f9bb475ccdcb9489874bd9ed2930b02f35fdd3c8131c12d887b4edd2f9a54f505bc0c3939a3a4c91b9b7c22509fbc348006bd10527919", 0xd5, 0x180000}, {&(0x7f0000000100)="d85a5905b08fb4d5ba83229a5bb6cd05", 0x10, 0x401}, {&(0x7f0000000140)="cd578a796350c1", 0x7, 0x401}, {&(0x7f0000000340)="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", 0x1000, 0x1}, {&(0x7f0000001340)="dfefd06c02c3c59f5b9e8af1327c7617223ab51a268f2a27303d1bb249d6fa4ea6e9c6853684beb4302ff5cff171972f2c29a0ea859f82cc79455a617e7aa07ce570c0e326755a68660f9b20ef53203b78d3b90bfbf4fc32c508082ecca1", 0x5e, 0x5}], 0x100048, &(0x7f00000001c0)={[{@huge_never}], [{@pcr={'pcr', 0x3d, 0xe}}, {@dont_hash}]}) openat(r0, &(0x7f0000001480)='./file0\x00', 0x200, 0x82) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x400080, 0x90) openat(0xffffffffffffffff, &(0x7f0000001440)='./file0\x00', 0x1000, 0xc0) 14:23:55 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xf000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:55 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) r5 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r5, 0xc, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x5, 0x0, 0x1f, 0x81, 0x0, 0x2, 0x1101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x4400, 0x3, 0x9, 0x7, 0x9, 0xafff, 0xb4ea, 0x0, 0x9, 0x0, 0x10000}, r5, 0x4, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:23:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000006000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:23:55 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) r5 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r5, 0xc, 0xffffffffffffffff, 0x9) ptrace$setsig(0x4203, r5, 0x2, &(0x7f0000000200)={0x2, 0x3}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:23:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:23:55 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) execve(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000440)='/&:-/.&-!@{-!$,[\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='/dev/sr0\x00'], &(0x7f0000000600)=[&(0x7f0000000540)='bond_slave_1\x00', &(0x7f0000000580)='*#]@})\x00', &(0x7f00000005c0)='^\x00']) pwritev(r1, &(0x7f0000000780)=[{&(0x7f00000003c0)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r1, 0x3, 0x0, 0x3) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) r6 = accept$unix(r5, &(0x7f0000000140), &(0x7f00000000c0)=0x6e) ioctl$sock_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000001c0)) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x80, 0x0) 14:23:55 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2818.540904] loop6: detected capacity change from 0 to 4 [ 2818.561116] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2818.597352] loop6: detected capacity change from 0 to 4 [ 2818.611947] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2818.624416] tmpfs: Unknown parameter 'bond_slave_1' 14:23:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = open(&(0x7f0000000000)='./file1\x00', 0x0, 0x10) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x0, 0x0, 0x40, 0x2, 0x0, 0x4, 0x10000, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x4470fb74, 0x101c}, 0x81c, 0x100000000, 0x2, 0x1, 0xffffffff80000000, 0x100, 0x3, 0x0, 0xee98, 0x0, 0xffff}, r0, 0x1, r1, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000300), 0x0, 0x0) [ 2818.680259] tmpfs: Unknown parameter 'bond_slave_1' [ 2818.722537] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:23:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000007000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:23:55 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x80000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:23:55 executing program 0: time(&(0x7f00000000c0)) read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) r4 = getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$pokeuser(0x6, r4, 0x708, 0x8001) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:23:55 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:23:55 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:23:55 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/bus/clocksource', 0x90800, 0x40) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r5, 0x3, 0x0, 0x3) dup(r5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {0x7}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, &(0x7f0000000180)={@id={0x2, 0x0, @a}}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2818.925204] loop6: detected capacity change from 0 to 4 [ 2818.954689] EXT4-fs (loop6): invalid first ino: 4114797056 14:23:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 2819.027937] tmpfs: Unknown parameter 'bond_slave_1' 14:23:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(r0, &(0x7f00000003c0)='./file1\x00', 0x4001, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x15182, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x6, 0x0, 0x401, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x6beb) sendfile(r3, r1, 0x0, 0xfffffdef) 14:23:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000f000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2819.095407] tmpfs: Unknown parameter 'bond_slave_1' [ 2819.315011] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:24:11 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) pread64(r4, &(0x7f0000000140)=""/89, 0x59, 0x7337) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:24:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r0, 0x3, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = socket(0x9, 0x800, 0x8) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)={0x31c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0xffff7571, 0x51}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x2e8, 0x33, @mgmt_frame=@probe_response={@with_ht={{{0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x5}, @device_a, @broadcast, @random="ac10b17eedc9", {0x9}}, @ver_80211n={0x0, 0x0, 0x2, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}}, 0x6, @default, 0xb484, @val={0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x1, [{0xc, 0x1}]}, @val={0x3, 0x1, 0xb3}, @void, @void, @val={0x2d, 0x1a, {0x20, 0x0, 0x1, 0x0, {0x1, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3}, 0x300, 0x7ff, 0x3}}, @void, @val={0x71, 0x7, {0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x4, 0x29}}, [{0xdd, 0xf0, "c23a3492440435d9a32aeb8549844309fb637760fd051e0e049e1a5b4c306e6f98b9cbd2a519cd6e65f6343f6f54dd311e6dca55032aa28fc3b32cfd72985077479c20b61e26d1033a0b95552842d541f4a568509c0bd2089931a4ce0235d61186e0887eb46f8c9612e7a824b63351da70710906ca24678d3d982cbb6757c8ec523f13705ebdaeedb472debbb659a44188403e83119234bfc00544435f1cf6dba39947227c1989613ddca55814600ad8fd4e83c9470e713f6ef1c2d9f5f62d432d16fb8730809a06f96c70768cf0b51a0d14f97de635784c66459785b989ed0d7a80d3bfc859db6178488d6be993af34"}, {0xdd, 0x91, "4855fcf79e4c20d7135405a0a1ee1f3e552a620351a43fc11d494297d330be1bc2e894c443814fdc5f11975768303b2fbded114eb4171730bfad0ec7bd85f70261d0680cbe935836ef673bd1b58ed45ebf09cf13a7653d170e595d6664ae0bf0a00bd5ca8d68046e2c748f24e13a73d0a4374da2bd414a82614306fa02ea50ee661845541c20bff859a2a4fc023a7c8eb5"}, {0xdd, 0x31, "b225564a22a5ecc8a6b28405505b20fc03be76277bd3a525f4a53c32ed1ca9ca8557019d80688c713fc15aa99352bb2bae"}, {0xdd, 0xcf, "fcba313efa8dcb4c32c44606838a128ac8f4651c5b6256ea599e350b7079d3728bae1b45da5b7b2b4c2621a2f855d440902c61e8d9e6df6ac157c9fa569b3b000d95b68794667854e5bd94953c991e8476232d36f1e88f9806b88e0cc4589b7df93a1b14646b2e44615d9114507c343553fc2c9a37909ca11bc80ceba8e73c7541619c854639ee0ff344379ad6956343a2db050bafcb8f6addb1f8cadc9f79e2b5ebb7bf289ee39e35a441ae6eb8548ab8b0b7992044b2d4cda9565ba65b5ca6cf92b17692bcb523937fe5b4ba1254"}]}}]}, 0x31c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r3, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r4, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:24:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:24:11 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x200000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:11 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) openat(r4, &(0x7f00000000c0)='\x00', 0x40000, 0x2a) 14:24:11 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:24:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000020002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:24:11 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x80) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000300)=""/229, 0xe5}, {&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f0000000400)=""/251, 0xfb}, {&(0x7f00000000c0)=""/51, 0x33}], 0x4) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = epoll_create(0x1) r5 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r4, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 2835.027698] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2835.041403] loop6: detected capacity change from 0 to 4 [ 2835.072756] EXT4-fs (loop6): invalid first ino: 4114797056 14:24:11 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2835.119502] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2835.137471] loop6: detected capacity change from 0 to 4 [ 2835.143428] tmpfs: Unknown parameter 'bond_slave_1' [ 2835.164092] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2835.172069] EXT4-fs (loop6): invalid first ino: 4114797056 14:24:11 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f00000001c0)="fd9a189fad233c8b732d02e6dae12a37334094146da08f85e2ea429bf42ed4042e5bf7796d50716308e417c88653940530c91209eaf035217965ab2b97d5de7a9513baefddea3a14b8635b6a74a36e64f074a75fd511d11b1e353764ef3cd5e7f76d76") ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/cgroup\x00') ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000540)={@dev, 0xf4}) fcntl$addseals(r1, 0x409, 0x14) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x80047213, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0xf10f, 0x2, 0x0, 'queue1\x00', 0x8}) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2835.196970] tmpfs: Unknown parameter 'bond_slave_1' 14:24:11 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x80ffff) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:11 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockname(r1, &(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f00000000c0)=0x80) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:24:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000030002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:24:11 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3dc86392000000, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x434081, 0x0) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_open_dev$char_usb(0xc, 0xb4, 0x1) dup2(r3, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000300)={0x41, 0x0, 0x7}) getpgrp(0x0) ptrace$getsig(0x4202, 0x0, 0x10000000003, &(0x7f0000000140)) socket$unix(0x1, 0x5, 0x0) dup3(r1, r1, 0x80000) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000080)='./file0\x00', r4, 0x0) [ 2835.347551] loop6: detected capacity change from 0 to 4 [ 2835.358820] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2835.368533] tmpfs: Unknown parameter 'bond_slave_1' [ 2835.384358] tmpfs: Unknown parameter 'bond_slave_1' 14:24:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000040002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2835.521986] loop6: detected capacity change from 0 to 4 [ 2835.526310] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2835.530060] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2835.539944] loop6: detected capacity change from 0 to 4 [ 2835.546332] EXT4-fs (loop6): invalid first ino: 4114797056 14:24:26 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x39, 0x0, 0xfffffffe}) socket$unix(0x1, 0x5, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) mknodat$loop(r4, &(0x7f0000000040)='./file0\x00', 0x4, 0x1) 14:24:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:24:26 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:24:26 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xf0ffff) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:26 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f00000000c0)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000140)=0x28) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x20010, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRESHEX, @ANYRESDEC, @ANYRESHEX=0x0, @ANYRESHEX, @ANYRES32=r3, @ANYRES64=r3, @ANYBLOB="31305fea50fdb35ff12edee961f9e17fd251c73be60a8adb909cd78ba8b0dfbf693131d7f45582a3b8aab65581a6b9"]) chdir(&(0x7f0000000180)='./file1\x00') symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:24:26 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000340)) 14:24:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000050002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:24:26 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x6, 0x8, 0x2, 0x1f, 0x0, 0x5, 0xe0824, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x43860, 0x1, 0x7, 0x9, 0x1ff, 0xffff0000, 0x0, 0x0, 0x9, 0x0, 0xfb}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = inotify_init1(0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f00000001c0)=[{&(0x7f0000000580)="bbe0cfd8cfff297f91787b09bf2f0fcf4232cb08be981e5613a7728d1906cba4bacd4b44bb68e5c74eb06d1223906a8e430b6147ef505570e884670356f430bdcad7aa06f3d93bacc2e6baf6c4959930a6573886999e00e2748fea798a6e373fb7ee688ce71b4dcb0f4ab627c346034feda25a0df121515dc90b13646ed41a7b2daf1c4266955f6fc5a0f97d606930c2728ff68dd8", 0x95}, {&(0x7f0000000400)="98bfc138ddadb83c2a248fc89785f9df7d783c6d25d962ee051d746a909b63fc91a07e188ba72113f9c1179d7b18e9277da2fb3ac0d430513533905967c357ce1c4e1bd94b9c1dc930c778afdadcfd0bfd7c64db43ba3118c57d2469312a8c7d86a3ab0f852eee11bec07a9f168565f18e02c964810de1faa1a40d65a04161ad3710d7f572fdbc933096eb3bd59c19cdbc4fc8a456c61f010f13b0ada9ad7c07f3b2fcdfe3760a", 0xa7}, {&(0x7f00000017c0)="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", 0x111e}], 0x3, 0x5, 0xe3b3) fallocate(r5, 0x3, 0x0, 0x3) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r6, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r6, 0x3, 0x0, 0x3) dup2(r6, r5) dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2850.372087] loop6: detected capacity change from 0 to 4 [ 2850.383645] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2850.434437] loop6: detected capacity change from 0 to 4 [ 2850.436151] EXT4-fs (loop6): invalid first ino: 4114797056 14:24:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000060002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:24:27 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xcb3bdcbd387deb68, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'veth1_vlan\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:27 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x80) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000300)=""/229, 0xe5}, {&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f0000000400)=""/251, 0xfb}, {&(0x7f00000000c0)=""/51, 0x33}], 0x4) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = epoll_create(0x1) r5 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r4, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 2850.551352] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:24:27 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:24:27 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x1000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:27 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:24:27 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'vlan0\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2850.748912] tmpfs: Unknown parameter 'bond_slave_1' [ 2850.765633] tmpfs: Unknown parameter 'bond_slave_1' 14:24:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000070002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:24:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:24:42 executing program 1: kcmp(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r0, 0x3, 0x0, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r1, 0x3, 0x0, 0x3) r2 = pidfd_getfd(r0, r1, 0x0) r3 = socket$inet6(0xa, 0x800, 0x4) r4 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f0000000280)=[{&(0x7f0000000100)="2fcb909da4b1d24c3acd344fd6a4e750c5c320f42225b3336ffa09a0f0823c165ca53894", 0x24, 0x8a}, {&(0x7f0000000140)="e399c6df6d8f8966109d234b79a30b985ad1470ce7f61f2b1b0318deb90164f3e8b0c8ea40b066fd8f38cecba0f2af32cd7df063a0a9ea99b25b2c96623aab56eb206baf2e00f45aac75d42bcf20e7d6334b64da49f9f6b8681887a7af73e1c53631f77903ced461395a1b7741084f5409efc61c42fe3d6da130d6", 0x7b, 0xa74a5bc}, {&(0x7f00000001c0), 0x0, 0x7fff}, {&(0x7f0000000200), 0x0, 0x8}, {&(0x7f0000000240), 0x0, 0x4}], 0x200058, &(0x7f0000000300)={[{'3^[#'}, {'/\'{[,^-'}, {'\x00'}, {}, {')]]\'-%#'}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, '\x00'}}]}) sendfile(r3, r4, &(0x7f0000000340)=0x2, 0x3) r5 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0xc, 0x1f, 0x20, 0x0, 0x4, 0x4, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7f, 0x100000000}, 0x0, 0x1, 0xfffffff9, 0x1, 0x4e, 0x94, 0x4, 0x0, 0x5, 0x0, 0x1e}, r5, 0x4, r2, 0x1) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r4, 0x942e, 0x0) bind(r3, &(0x7f0000000080)=@rc={0x1f, @any, 0x81}, 0x80) 14:24:42 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x2000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:42 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'hsr0\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:24:42 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x19, 0x2, 0x0, 0x6, 0x840, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x80000001}, 0x1, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) waitid$P_PIDFD(0x3, r4, 0x0, 0x40000000, &(0x7f0000000140)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:42 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:24:42 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x6, 0xff, 0x20, 0x5}, {0x0, 0x8, 0x81, 0x6}, {0x7, 0x6, 0x0, 0x3}]}, 0x10) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 2866.227107] loop6: detected capacity change from 0 to 4 [ 2866.296739] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2866.326321] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2866.338320] loop6: detected capacity change from 0 to 4 [ 2866.359208] EXT4-fs (loop6): invalid first ino: 4114797056 14:24:43 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:24:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000080002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:24:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 2866.521817] loop6: detected capacity change from 0 to 4 [ 2866.538931] EXT4-fs (loop6): invalid first ino: 4114797056 14:24:43 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x3000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2866.657011] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:24:58 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x4000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:58 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r3, 0x3, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000800000000002e2f66fa00000000"]) r4 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r5 = inotify_init1(0x0) dup2(r3, 0xffffffffffffffff) r6 = dup2(r5, r4) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) pidfd_getfd(r6, r2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r7, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r7, 0x3, 0x0, 0x3) symlinkat(&(0x7f0000000140)='./file1\x00', r7, 0x0) 14:24:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="2000000b0002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:24:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000600)=""/148, 0x94) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000000)={'lo\x00', @ifru_ivalue}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file1\x00'}) 14:24:58 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:24:58 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) inotify_init1(0x80800) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) openat(r4, &(0x7f0000000040)='./file0\x00', 0x20a000, 0x20) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:24:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:24:58 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1ff}, 0x11200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {}, [@GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @empty}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010100}]}, 0x34}, 0x1, 0x0, 0x0, 0x8c1}, 0x81) r5 = getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xe0, 0x7f, 0x3f, 0x1, 0x0, 0x80, 0x10140, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xe48e, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x4, 0xb72c, 0x3, 0x1, 0x8000, 0x8, 0x401, 0x0, 0x4, 0x0, 0xffff}, r5, 0x2, 0xffffffffffffffff, 0x1) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 2881.821963] loop6: detected capacity change from 0 to 4 [ 2881.845200] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2881.849448] tmpfs: Unknown parameter 'bond_slave_1' [ 2881.864498] loop6: detected capacity change from 0 to 4 [ 2881.897747] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2881.900974] tmpfs: Unknown parameter 'bond_slave_1' [ 2881.910953] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:24:58 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:24:58 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x5000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:24:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000180002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:24:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:24:58 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:24:58 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) memfd_secret(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r3, 0x3, 0x0, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) dup3(r2, 0xffffffffffffffff, 0x80000) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:24:58 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) inotify_init1(0x80800) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) openat(r4, &(0x7f0000000040)='./file0\x00', 0x20a000, 0x20) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 2882.151508] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2882.184139] loop6: detected capacity change from 0 to 4 14:24:58 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x6000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2882.206745] EXT4-fs (loop6): invalid first ino: 4114797056 14:24:58 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2882.288381] tmpfs: Unknown parameter 'bond_slave_1' [ 2882.340006] tmpfs: Unknown parameter 'bond_slave_1' 14:25:16 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x7000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2899.900784] loop6: detected capacity change from 0 to 4 14:25:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x2423c1, 0x1) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r0, 0x3, 0x0, 0x3) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2, 0x0, 0x9}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4000010) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x40144, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r1, 0x0) signalfd(r2, 0x0, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r5 = inotify_init1(0x0) pread64(r3, &(0x7f0000000300)=""/212, 0xd4, 0x8001) r6 = dup2(r5, r4) getpid() ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:25:16 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0xf8, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x7, 0x6f}}}}, [@NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="29ff3eb0eb8c8cf66e88ee26d5167f56793541c450db36af"}, @NL80211_REKEY_DATA_AKM={0x5b, 0x4, 0x82}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d726c486eaf01a75"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="4bf0283bb5a51e2a825152c43820ebcb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x10}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "f9481dc3390f165c"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "7bba3f28eda8a65c"}]}, @NL80211_ATTR_REKEY_DATA={0x58, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "54eb7c2c0cb02852"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="98ac1ab0b6957fb9de3cb5f570f0a247"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c0b8424286019da"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xffff295f}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2bfd1ed9f4c2f35d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="249a1700c04681807908b78e700e3c0e"}]}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="d98b3d256b6a9b829774ac9c35270da8"}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008000) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:25:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="2000001c0002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:25:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:25:16 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r3, 0xc, 0xffffffffffffffff, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x40, 0x86, 0x5, 0x7, 0x0, 0x401, 0x30000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x22, 0x7fe, 0x4, 0x1, 0x405, 0x2, 0x4, 0x0, 0x7, 0x0, 0xa1f}, r3, 0xa, r4, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r2, r1) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:25:16 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r3, 0x3, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000800000000002e2f66fa00000000"]) r4 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r5 = inotify_init1(0x0) dup2(r3, 0xffffffffffffffff) r6 = dup2(r5, r4) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) pidfd_getfd(r6, r2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r7, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r7, 0x3, 0x0, 0x3) symlinkat(&(0x7f0000000140)='./file1\x00', r7, 0x0) 14:25:16 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00', @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2899.917655] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2899.931588] loop6: detected capacity change from 0 to 4 [ 2899.934192] EXT4-fs (loop6): invalid first ino: 4114797056 14:25:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000620002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:25:16 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x1800) inotify_add_watch(r4, &(0x7f00000000c0)='./file0\x00', 0x810) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 2900.044705] loop6: detected capacity change from 0 to 4 [ 2900.059466] tmpfs: Unknown parameter 'bond_slave_1' [ 2900.069312] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2900.090308] loop6: detected capacity change from 0 to 4 14:25:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x4e) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@version_u}, {@cache_mmap}]}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) close_range(r0, r0, 0x2) clone3(&(0x7f0000000300)={0x80000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100), {0x2}, &(0x7f0000000140)=""/81, 0x51, &(0x7f0000000440)=""/216, &(0x7f00000002c0)=[r3, r2, r2], 0x3}, 0x58) [ 2900.101828] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2900.108262] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:25:16 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x8, 0xffffffffffffff77, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r4 = inotify_init1(0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0/file0\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0x0, [0x100, 0x7, 0x1ff]}, &(0x7f0000000380)=0x44) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:25:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000670002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:25:16 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="080002", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:25:16 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) r5 = dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) getsockopt$sock_int(r5, 0x1, 0x27, &(0x7f00000000c0), &(0x7f0000000140)=0x4) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:25:16 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x8040000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:25:16 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x14) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x141000, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000180)=""/128, 0x80}, {&(0x7f0000000300)=""/76, 0x4c}, {&(0x7f0000000380)=""/180, 0xb4}, {&(0x7f0000000440)=""/205, 0xcd}, {&(0x7f0000000540)=""/244, 0xf4}], 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000ab7e"], 0x120}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000140)={0x723, 0xffffffffffffffc1, 0x0, 0x1f, 0x6, 0xced}) r4 = inotify_init1(0x0) r5 = dup2(r4, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) r6 = socket$unix(0x1, 0x5, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x3) dup3(r5, 0xffffffffffffffff, 0x0) r8 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[@ANYRESOCT=r6, @ANYRES16=r2]) symlinkat(&(0x7f0000000000)='./file0\x00', r8, 0x0) [ 2900.282007] loop6: detected capacity change from 0 to 4 [ 2900.315660] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2900.322464] tmpfs: Unknown parameter 'bond_slave_1' 14:25:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 2900.359967] tmpfs: Unknown parameter 'bond_slave_1' 14:25:16 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="080002", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:25:17 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) r6 = fcntl$dupfd(r3, 0x406, r2) ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) [ 2900.533737] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2900.540503] tmpfs: Unknown parameter 'bond_slave_1' [ 2900.580260] tmpfs: Unknown parameter 'bond_slave_1' 14:25:38 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r1, 0x0, 0x3, &(0x7f00000000c0), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='nl80211\x00') r2 = fork() r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x4) pwritev(r3, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r3, 0x3, 0x0, 0x3) close(r3) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xfa, 0xff, 0x9, 0x20, 0x0, 0x1ff, 0x8000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x4, 0x2}, 0x800, 0x2040, 0x6, 0x7, 0x5, 0xffff, 0x7, 0x0, 0x6, 0x0, 0x7}, r2, 0x4, 0xffffffffffffffff, 0x8) 14:25:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000f60002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:25:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:25:38 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f00000001c0)={0xa, 0xebbb, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r5 = socket$unix(0x1, 0x5, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r6, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) dup3(r2, r5, 0x80000) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:25:38 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="080002", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:25:38 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:25:38 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x10000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:25:38 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x0, 0xf, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5869}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2921.672726] loop6: detected capacity change from 0 to 4 [ 2921.688375] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2921.704214] loop6: detected capacity change from 0 to 4 [ 2921.717786] EXT4-fs (loop6): invalid first ino: 4114797056 14:25:38 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) openat(r2, &(0x7f0000000380)='./file0\x00', 0x100, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000140)=""/24, 0x18}, {&(0x7f0000000180)=""/30, 0x1e}], 0x3, 0x31, 0xfffffff6) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r3) fsync(r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) fspick(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x23ce, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2921.756135] tmpfs: Unknown parameter 'bond_slave_1' 14:25:38 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x12010000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:25:38 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) ioctl$PTP_SYS_OFFSET_PRECISE(r4, 0xc0403d08, &(0x7f00000001c0)) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) r5 = dup3(r3, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) dup3(r5, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="0100883d61d7090000000000", @ANYRES32=r2, @ANYRES32, @ANYRESOCT]) connect$unix(r8, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:25:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000580)='net/ip_mr_cache\x00') write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="cc00fa4060010000d102000002000000cd01000001000000000000000000000014b906c3944a69ea0d14c40180be0f7ea8bbe704a03b78f85e867c8ecc69336cacc3df9e62d2daaf336ac18f4453075ed7c4c7704bc7c49b2c1e3fbd513753ea0e33587d32c279aa756e94317eb36d2f4220ff7fde614fca84cd80d0a7f3dec7cd8c05472a8ac8e3618a46d8914f3ae75599e5225a86572f26f42f728ce62abd150804c6b1a7d2ad16c6cf69ffc25ef866b052ad8e34727062e301595521b83f471226df6f1abd4c87f26f0a6b3339000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001200"/1231], 0x4cf) [ 2921.846205] tmpfs: Unknown parameter 'bond_slave_1' 14:25:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000fc0002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:25:38 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2921.924243] loop6: detected capacity change from 0 to 4 14:25:38 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x80) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 2921.950058] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2921.980544] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2922.016362] tmpfs: Unknown parameter 'bond_slave_1' [ 2922.026488] tmpfs: Unknown parameter 'bond_slave_1' 14:25:53 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x69]}, 0x8, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r5, r6) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r7, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r7, 0x3, 0x0, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:25:53 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:25:53 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x142090, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c7766646e6f90278b75ca9fef8a30d739debe4cf5be6e5b6d4f6db353254f3200a8834db906e1c9b93ffec250a1d1979fa7a86415746e76c05b670a8ec15ad8f95b686189ea863cc91b90241519f89798a8e92cb15f4d0694c71b9f095d648373d9b4e7b166958a01e4fef29e56864fff3a1ab228a8ab10d9102b3d8b9cc5449ee5193d695df4b38597a65927223c7f695f685db6cac8270ef7d7f8c2ae84f11d284aed677dd13128699cffa49394e5704bbca2725f9778ca0a64d1c7d718ba9275957234463ca3422fa886", @ANYRESHEX, @ANYBLOB=',mmap,msize=0x0000000000000000,loose,context=sysadm_u,uid=', @ANYRESDEC=r5, @ANYBLOB="2c6673757569643d63383635323766682d006139302d363963302d336100382d32383566663333382c7375626a5f747970653d626f6e645f736c6176655f31002c686173682c736d61636b6673726f6f743d746d706673002c6673757569643d38633566613030362d64635a662d393533362d383835322ddc3733625f3661382c736d61636b66737472616e736d7574653d626f6e645f736c6176655f31002c6673757569643d35343864336436482d346c64302d323534632d303161002d30356200336633662c00"]) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:25:53 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x1, 0x0, 0x3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="4bf680fd2100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r6 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:25:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x7, 0x0, 0x1f, 0x22, 0x0, 0xffff, 0x40, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x3, 0xdd}, 0x40000, 0x0, 0x50f, 0x1, 0x689, 0x1, 0x100, 0x0, 0x8, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001a00010212c91ef13440ca500a"], 0x28}}, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write(r0, &(0x7f0000000080)="01", 0x41030) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x1, 0x80, 0x1, 0x3f, 0x0, 0x1, 0x44500, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000140), 0x9}, 0x0, 0x5, 0x180, 0x9, 0x20, 0xfffff13e, 0x6, 0x0, 0x6, 0x0, 0x7ae}, 0xffffffffffffffff, 0x7, r0, 0x0) fork() 14:25:53 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x18000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:25:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000fe0002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:25:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 2936.660716] loop6: detected capacity change from 0 to 4 [ 2936.675651] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2936.689203] loop6: detected capacity change from 0 to 4 [ 2936.698084] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2936.708378] tmpfs: Unknown parameter 'bond_slave_1' 14:25:53 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x20000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:25:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000d00102000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2936.773252] tmpfs: Unknown parameter 'bond_slave_1' [ 2936.833255] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:25:53 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/8250_core', 0x0, 0x22) mq_notify(r0, &(0x7f0000000180)={0x0, 0x40, 0x4, @tid=0xffffffffffffffff}) read(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r1, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '^:%@\\-\x00'}) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:25:53 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2936.955840] loop6: detected capacity change from 0 to 4 14:25:53 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0xd, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x100000000, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = dup2(r2, r1) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() r4 = socket$inet(0x2, 0x80000, 0x4) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000000c0)=0x800000) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x5, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 2936.974821] EXT4-fs (loop6): invalid first ino: 4114797056 14:25:53 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3, 0xff, 0x3, 0x83, 0x0, 0x0, 0x10000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x100, 0x4, @perf_config_ext={0x45, 0x8}, 0x4040, 0x5, 0x6, 0x0, 0x3800000000000, 0x0, 0x8001, 0x0, 0x7733, 0x0, 0x5}, 0x0, 0xc, r0, 0x1) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2937.160638] tmpfs: Unknown parameter 'bond_slave_1' [ 2937.428268] tmpfs: Unknown parameter 'bond_slave_1' 14:26:11 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x2}, 0x7) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:26:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="2000000f0202000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:26:11 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x45, 0x5, 0x7, 0x0, 0x100000000, 0x6094, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xafc, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x485, 0x1, 0x6, 0x9, 0x7ff, 0x9, 0x2000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x7, r4, 0x8) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:11 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}, 0x0, 0x0, 0x40}, 0x0, 0x7, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000040)='@^@\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:26:11 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:26:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:26:11 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x21030000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:11 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2954.993426] loop6: detected capacity change from 0 to 4 [ 2955.040767] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2955.076362] tmpfs: Unknown parameter 'bond_slave_1' [ 2955.079262] loop6: detected capacity change from 0 to 4 [ 2955.099769] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2955.191734] tmpfs: Unknown parameter 'bond_slave_1' 14:26:11 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:26:11 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x24000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:11 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x28e9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x946) dup2(r0, 0xffffffffffffffff) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x7ff, 0x0) fallocate(r5, 0x3, 0x0, 0x3) readlinkat(r1, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000300)=""/212, 0xd4) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:26:11 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:26:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000302000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2955.276913] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2955.366597] loop6: detected capacity change from 0 to 4 [ 2955.383248] EXT4-fs (loop6): invalid first ino: 4114797056 14:26:11 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() r5 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x9, 0x9, 0x4, 0x9, 0x0, 0x2, 0x80000, 0xc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2cd, 0x4, @perf_bp={&(0x7f0000000140), 0x2}, 0x4012c, 0x7, 0x0, 0x1, 0x2, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x3, 0x7, 0x8, 0x1f, 0x0, 0x0, 0x82100, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x2}, 0x802, 0x8, 0x7, 0x5, 0x7, 0xfffffff9, 0x1ff, 0x0, 0x5, 0x0, 0x1}, 0x0, 0xa, r5, 0x8) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x4, 0x0, 0x0, 0x1b20c1a, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:26:12 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r5, 0x3, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r5, {0x101}}, './file0\x00'}) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:26:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000800402000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2955.638410] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:26:30 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x5e010000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:30 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:26:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:26:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000502000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:26:30 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:26:30 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x200000000000001, &(0x7f0000000300)) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/sit', 0x600002, 0x1a) openat(r5, &(0x7f0000000140)='./file0\x00', 0x88000, 0x4) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:30 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x1b0, r2, 0x100, 0x70bd28, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x1, 0x7c}}}}, [@NL80211_ATTR_KEYS={0xf4, 0x51, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x3}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_SEQ={0x8, 0x4, "f2aa4b87"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "eb094a0a469f14e860e4d782d9"}]}, {0x18, 0x0, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "cc1aeba2c0"}, @NL80211_KEY_SEQ={0x6, 0x4, '\v|'}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "0f9b624bcf"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "53825a47804aca994e10ff3fff"}, @NL80211_KEY_IDX={0x5}]}, {0x68, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8, 0x7, 0x1}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_SEQ={0xc, 0x4, "a0bfad09cda59ef2"}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_SEQ={0x13, 0x4, "81777f5a558a0130580e2431055a73"}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_SEQ={0x11, 0x4, "1a58cb997017271b19ba6bd245"}]}]}, @crypto_settings=[@NL80211_ATTR_CONTROL_PORT_NO_PREAUTH={0x4}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x88a8}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x88f8}, @NL80211_ATTR_CONTROL_PORT_NO_PREAUTH={0x4}, @NL80211_ATTR_AKM_SUITES={0x1c, 0x4c, [0x0, 0xfac02, 0xae42bba95a89c3d, 0xfac08, 0xfac0b, 0xfac05]}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x10, 0x49, [0xfac08, 0xfac0a, 0xd]}, @NL80211_ATTR_AKM_SUITES={0xc, 0x4c, [0xfac10, 0xfac0f]}, @NL80211_ATTR_CONTROL_PORT={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}], @NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x40, 0x2, 0x2, 0x0, {0x100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, 0x800, 0x0, 0x9}}, @NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x10, 0x1, 0x4, 0x0, {0x3, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x400, 0x80, 0x3}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x200000c1}, 0x800) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r5 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r5, r4) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) r6 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r6, 0xc, 0xffffffffffffffff, 0x9) ptrace$getsig(0x4202, r6, 0x3, &(0x7f0000000540)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:30 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x2}, 0x7) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 2973.985066] loop6: detected capacity change from 0 to 4 [ 2974.017236] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2974.037190] loop6: detected capacity change from 0 to 4 [ 2974.048887] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2974.063272] tmpfs: Unknown parameter 'bond_slave_1' [ 2974.115837] tmpfs: Unknown parameter 'bond_slave_1' [ 2974.125912] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:26:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000602000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:26:30 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2974.160122] tmpfs: Unknown parameter 'bond_slave_1' 14:26:30 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x80040000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:30 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) signalfd(r1, &(0x7f00000000c0)={[0x7f]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:26:30 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(r1, &(0x7f00000007c0)={&(0x7f0000000300), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/192, 0xc0}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f00000000c0)=""/26, 0x1a}, {0xfffffffffffffffd}, {&(0x7f00000001c0)}, {&(0x7f0000000500)=""/121, 0x79}, {&(0x7f0000000580)=""/69, 0x45}, {&(0x7f0000000600)=""/41, 0x29}], 0x9, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r5, 0x3, 0x0, 0x3) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x2, 0x1, 0x9, 0x0, 0x81, 0x20000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x57, 0x80}, 0x30, 0x8, 0xb1d, 0x6, 0x0, 0x3, 0x3, 0x0, 0x4, 0x0, 0x8}, r3, 0x7, r5, 0x8) r6 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r7 = inotify_init1(0x0) r8 = dup2(r7, r6) getpid() ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000800)='.\x00', 0x0, 0x3, &(0x7f0000000a80)=[{&(0x7f0000000840)="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", 0xfd}, {&(0x7f0000000940)="aa99cf1653e7b27b497b43850efa713fb73487ec25e0a1c3b11d76d284428073b656c0004aae25486c7a59a1072fc11725977fa0b6fba045fce3c6eabf16a94991b9ac46d3dafe2f21dfc3306a4ed35e3ad259050ccc3d41067da03ea05459517f46f26df81fac883e8df14f8bba8d293713cee4268ccab9f1c1a8", 0x7b, 0x6}, {&(0x7f00000009c0)="fa5c1556efaf2a21073072b2a21d0cfd3365a5c435e7e500c40ebc61641bd6deb6c37fe29808048e8eb73e846de3adf2cbe3f20d27dce1a9c7683b4777038a9ef8e2be818097b4d1ca08341f54f4d1b2a550f0953183624db7c734fbdc86456907006a65f7ea534e7bea76d34501d3ddf61be794827798d65aae44a0ee4cf1034e3d275dda35e78fa46e33f7872adaf5965c4acb2db0bc8db59f3cfcdc0c39a8057ae7cc341b76c7", 0xa8, 0x101}], 0x80, &(0x7f0000000b00)={[{@shortname_lower}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_lt={'uid<', r2}}, {@fowner_eq}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fowner_lt={'fowner<', r4}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r8, 0xffffffffffffffff, 0x0) r9 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r9, 0x0) [ 2974.252998] loop6: detected capacity change from 0 to 4 [ 2974.264253] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2974.275694] loop6: detected capacity change from 0 to 4 [ 2974.284839] EXT4-fs (loop6): invalid first ino: 4114797056 14:26:30 executing program 1: ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r1 = inotify_init1(0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) fspick(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r3, 0x3, 0x0, 0x3) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000016c0)=[{&(0x7f0000000300)="7446ca6fda6f7b789074eda2edee109ce443e39351759ec46fdf6788df4327aad93e252ca26589a58fcba15637bbac0408b66910eb8b88d660d45011eecd1ebc53d8174692fd0f50925c87f5187d4f1e9f81758b98fd959a4af8fea7c119bf3e", 0x60}, {&(0x7f0000000380)="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", 0xfe}, {&(0x7f0000000480)="04616e5a311f39b80126247b9c9d4c5b98a585bd20a27e7b76f146b59eaa3e2e84df1116bc09c91956e76295a70ad8edafbbbf6c4e8a6ff4e6c40c3806e98966d76e82da763f179ca30b77f24f91770905ddb8d999a5db0e74f244e26b1111b0bb09fdef663badb253e92515cc8c12e68b2dcb649bcb175d8eb1bb55b3634e35a88fad", 0x83}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="198c55a97c92ab0ec8d8666d3d861746fed672201045e87c5bbfe1ec5e3a6cf5d9ddcc5fc12a3e16d614db9dfa55fdb58bc127fe8fa5784e668c92fa65688552db2b1e7b209dd6a0277764e33ff27024856e7a974917691f50135797fdb50f20b47d", 0x62}, {&(0x7f00000015c0)="6607cac5cc21cc96775ca7fbbb8b2a2c4ac20e61306aa8380c818c13c4388da5366210a2388fc3e7c8f38992d69b738d0ebe979ff5812b0c38fe6d325fe72284456eee88049140950d7149453e860e6d728a372a2e4bdfc080c606e1c7b9710b5a14ddf4bce66b73b2572362873eac9a34aaac97022bb85d92fe06fee1b7cefd87c3e06f9ed8e4885d536560d5fd22b76c43685bc31b11e06ffadf737187d6e40f4ff0dd8583d0840f692fed459c60191a070148b4321510bde9527194dea3bb33463035a7c7deb5409a0fe47e6e8f070fd721f652347791e94152fb2e", 0xdd}], 0x6, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x50}}], 0x1, 0xa000) dup2(r1, r0) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/107, 0x6b) clone3(0x0, 0x0) 14:26:30 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:26:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000702000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:26:31 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = syz_io_uring_setup(0x650b, &(0x7f00000001c0), &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000280)=0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r4, 0x8000000) syz_io_uring_submit(r6, r5, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x2e88, &(0x7f0000000140)={0x0, 0xdccd, 0x20, 0x0, 0xa8, 0x0, r2}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000001380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000380)="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", 0x2, 0x0, 0x0, {0x1}}, 0x9) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2974.487810] loop6: detected capacity change from 0 to 4 [ 2974.501421] tmpfs: Unknown parameter 'bond_slave_1' [ 2974.511277] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2974.599467] tmpfs: Unknown parameter 'bond_slave_1' 14:26:49 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x8cffffff) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:49 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf36, 0x6}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/xz_dec', 0x10000, 0x30) openat(r4, &(0x7f0000000140)='./file0\x00', 0x0, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:26:49 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) write$binfmt_elf32(r4, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x1, 0x2, 0x0, 0x6, 0x3, 0x3, 0x80000001, 0xb4, 0x38, 0x31f, 0x1000, 0x6, 0x20, 0x2, 0x1, 0x6, 0xffff}, [{0x4, 0x7, 0x9, 0x0, 0x46, 0x9, 0x7, 0x4}], "03d25351f1dc0d5a210200252d782ac5cff35fee2adc9cf4317a6c1eb302095c61a837", ['\x00', '\x00', '\x00', '\x00']}, 0x47b) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000140)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:49 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r0, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x60, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80000001}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2f1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1841}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}]}, 0x60}, 0x1, 0x0, 0x0, 0x800}, 0xc040) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="94000000", @ANYRES16=r0, @ANYBLOB="020025bd7000fddbdf256b00000008000300", @ANYRES32=r2, @ANYBLOB="0c0099ed8caaee00720000000a001a0108021100000100000a00060008021100000100000a000600ffffffffffff00000a001a0008021100000000000a00060008021100000100000a001a0008021100000000000a00060008021100000000000a00060008021100000000000a0006000802110000010000"], 0x94}, 0x1, 0x0, 0x0, 0x200440c0}, 0x20000011) execve(&(0x7f0000000080)='./cgroup/pids.max\x00', 0x0, 0x0) 14:26:49 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xe6714018b17ae0d1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:26:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:26:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000b02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:26:49 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2993.417382] loop6: detected capacity change from 0 to 4 [ 2993.438892] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2993.457703] loop6: detected capacity change from 0 to 4 [ 2993.479496] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2993.503059] tmpfs: Unknown parameter 'bond_slave_1' [ 2993.575944] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:26:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000020f02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 2993.595509] tmpfs: Unknown parameter 'bond_slave_1' 14:26:50 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x121042, 0x21) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="000074b57a68dd7ff02800"]) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000940)=ANY=[@ANYBLOB="0c5b6bbf1ff2d5da79accdb8c4a9439602676b21", @ANYBLOB]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x100000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x203, 0xfff}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 14:26:50 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000040)={0x0, 0x1, 0xff}) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:26:50 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:26:50 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000ee3c0000", @ANYRES32=r2, @ANYBLOB="642dffff000000002e2f66696c653000"]) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x181000, 0x0) dup2(r6, r5) dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:26:50 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) dup2(r1, r5) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:26:50 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x92010000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2993.747487] loop6: detected capacity change from 0 to 4 [ 2993.774417] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2993.796513] loop6: detected capacity change from 0 to 4 [ 2993.835124] EXT4-fs (loop6): invalid first ino: 4114797056 14:26:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000d21102000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:26:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:26:50 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 2994.042321] tmpfs: Unknown parameter 'bond_slave_1' [ 2994.117098] tmpfs: Unknown parameter 'bond_slave_1' [ 2994.122156] loop6: detected capacity change from 0 to 4 14:26:50 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r3, 0x3, 0x0, 0x3) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r3, 0x40089413, &(0x7f00000000c0)=0xffffffffffffff11) r4 = inotify_init1(0x0) r5 = perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x8, 0x1, 0x80, 0x81, 0x0, 0x46, 0x1020c, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xd, 0x0, @perf_config_ext={0xffffffffb754628c, 0x4}, 0x10, 0xaf92, 0x7, 0x7, 0x3, 0xb, 0x8, 0x0, 0x0, 0x0, 0x3f8}, 0xffffffffffffffff, 0x4, r0, 0x1) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = dup2(r4, r2) dup2(0xffffffffffffffff, r5) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000380)=0x0) ptrace$setsig(0x4203, r8, 0x8, &(0x7f0000000200)={0x3b, 0x0, 0x2}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) write$P9_RWRITE(r6, &(0x7f00000001c0)={0xb, 0x77, 0x9}, 0xb) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 2994.148509] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2994.196856] loop6: detected capacity change from 0 to 4 [ 2994.201206] EXT4-fs (loop6): invalid first ino: 4114797056 [ 2994.236345] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:27:09 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:27:09 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xa1ffffff) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:27:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:27:09 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'wg0\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:27:09 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x70420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xfffffffffffffff9}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) pidfd_send_signal(r1, 0x1d, &(0x7f0000000140)={0x2b, 0x400, 0x3f}, 0x0) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x3, 0xaf, 0x0, 0x5, 0x0, 0xfff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x49c, 0x1, @perf_bp={&(0x7f00000000c0), 0xa}, 0x5308e, 0x1f5, 0x7, 0x4, 0x2, 0x6, 0x5, 0x0, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0x1) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:27:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000001802000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:27:09 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:27:09 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)={0x1018, 0x14, 0x100, 0x70bd27, 0x25dfdbfe, {0x29, 0x1}, [@INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}]}, 0x1018}, 0x1, 0x0, 0x0, 0x40000}, 0x45) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x50080, 0x71) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) [ 3013.139029] loop6: detected capacity change from 0 to 4 [ 3013.152512] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3013.179516] loop6: detected capacity change from 0 to 4 [ 3013.200306] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3013.269411] tmpfs: Unknown parameter 'bond_slave_1' 14:27:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000001c02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000001802000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3013.374462] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:27:10 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0xdf, 0x2, 0x5, 0x1, 0x0, 0x1, 0x100, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000000c0), 0xd}, 0x2e9, 0x7fffffff, 0x3, 0x9, 0xffff, 0x0, 0x7, 0x0, 0x8, 0x0, 0xb66}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x7) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r0, 0x3, 0x0, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r0, 0x11, 0x0, 0x8) r2 = inotify_init1(0x0) r3 = signalfd(r2, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r5 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r5, r4) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3013.478108] loop6: detected capacity change from 0 to 4 [ 3013.497124] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3013.512775] loop6: detected capacity change from 0 to 4 [ 3013.526332] EXT4-fs (loop6): invalid first ino: 4114797056 14:27:28 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x8000000001}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) fspick(r2, &(0x7f00000001c0)='./file0\x00', 0x1) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) renameat2(r5, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x6) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:27:28 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="080004", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:27:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000002002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:27:28 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xf6ffffff) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:27:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:27:28 executing program 1: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x1) mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f0000ffc000/0x4000)=nil) mlock(&(0x7f0000ff7000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ff9000/0x3000)=nil, 0x3000) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000140)=0x1, 0x3, 0x2) 14:27:28 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x2}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x40005) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r3, 0xc, 0xffffffffffffffff, 0x9) fcntl$getownex(r2, 0x10, &(0x7f00000005c0)={0x0, 0x0}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000340)='Y', 0x1}], 0x1, 0x6, 0x80) fallocate(r5, 0x3, 0x0, 0x3) clone3(&(0x7f0000000640)={0x209810000, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x3f}, &(0x7f0000000440)=""/68, 0x44, &(0x7f00000004c0)=""/206, &(0x7f0000000600)=[0x0, 0x0, r3, 0x0, r4, 0x0], 0x6, {r5}}, 0x58) r6 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r7 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r7, r6) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:27:28 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r5 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x108) inotify_add_watch(r5, &(0x7f0000000140)='./file0\x00', 0xac0b198070cb541d) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 3031.728058] loop6: detected capacity change from 0 to 4 [ 3031.748778] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3031.769886] loop6: detected capacity change from 0 to 4 [ 3031.781702] EXT4-fs (loop6): invalid first ino: 4114797056 14:27:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000006202000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3031.861155] tmpfs: Unknown parameter 'bond_slave_1' 14:27:28 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xfbffffff) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3031.918234] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 3031.925950] tmpfs: Unknown parameter 'bond_slave_1' 14:27:28 executing program 1: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x1) mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f0000ffc000/0x4000)=nil) mlock(&(0x7f0000ff7000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ff9000/0x3000)=nil, 0x3000) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000140)=0x1, 0x3, 0x2) 14:27:28 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x10, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3031.973941] loop6: detected capacity change from 0 to 4 [ 3031.989027] EXT4-fs (loop6): invalid first ino: 4114797056 14:27:28 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="080004", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:27:28 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() r5 = open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81800) openat(r5, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x10) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0xa, 0x0, 0x1}) r6 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000680)={'ip6gre0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x29, 0x6c, 0x0, 0x6, 0x62, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, 0x8, 0x10, 0x5, 0x9}}) sendmsg$inet(r6, &(0x7f0000000980)={&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000180)="fc08a216bb283d63ef8ea6d9649e3af6d7d3d495a653b95c4b9f3771e6b18f189f5f1ff6cd6e01532d06", 0x2a}, {&(0x7f0000000300)="192d6cda270d592e2d6f452c3a907da563018a620b12fcdab1c97ef0880c9465f1861d067970ffb4665c81c31fe68bdc5ad11ad0376207db1476882f1c0f6274395b16e5484d3ba587e4a339d480a7df6eb74ac1c3a4f651f0d0e0086beb876c0fe470b7928bbb20a4b80cc27f894d9831af5f11dbc308db2b0c0fa59c26", 0x7e}, {&(0x7f0000000380)="748ed154ba24e9d5c2febc003e581789f3dae319094fcb7df3cad33d036ab4e891bef2a65e5d5251c98cb8f7c086790ebc53cee0ea381eb4b840c9fde931570c420cfa389ca53d63c7364cd461aa15671b84186f6dd477453c133e31a63e62023d2930d40f", 0x65}, {&(0x7f0000000400)="1e4958de5bb5e7d463885461c10e94def0b0f483254af9c2651a9d57043d6b6d690670c6c9c491cff85a2c368a7729de57e6bf2f60ffaeb05d10fa32758ca91ba108c0d88bd03c26b5542e13b68ca3f52bfe9468b90df3476908b563583c3c68dce64913f122f4dbab4d7c3bc67c7885763a9db35a9b38d0d71487a0ea66fe9982bf6f98df03", 0x86}, {&(0x7f00000004c0)="b270262c9105efb95beabbc00bc19ded3c679d0fedb5d011dbc0704fdbb63a05f723431b1e8313a5160b6520448d1c3ed4dc3df30cf2e3135a685a0c9f99acd36f4f31da8ec21248e8c885538184937c43d6fea4833c0fafa8cc95af5924f7caa8ea0c1a8b949f98ab0fa450c9ab379936d49e50e855cbc5bc6ce9c28d3b6211dbdbd1f8337932102647bd5646fb6efcf06d5b3d97d3362e722582750fdbb05c7b959db3118136fbc50de71c3226cd3e2e65c6e660", 0xb5}, {&(0x7f0000000580)="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", 0xfa}, {&(0x7f0000000700)="75486c479a6e91329a4251569ed39a5da6e00038daf81102895f4f0b2e298678b7d330d76ff21c99c4d1ff71eee8113d3bd00d45fbc316d361249dfd606c12c69413452cd0b569263e357b74bcff01bed302cd8bd2d42ddfb15c4a556c962647e0b8d0d84bd34b686baa43fbcfe26dc9d6236105e634de3ae4d09b6d22cc06e253df13a255eaf1c79fc05fcd2506eef6461ca25492452745d08a59eea182e632de7e8333b3a5584a2964308db12f6cf3eaedd608c5285d9589a0705a2b2f88bd50c024dfc594ce572dc390aadf18c3b417056ea9bacd928a849173edbb44eae0ff79a4fef2060fed22483c71365cc8f1", 0xf0}, {&(0x7f00000001c0)}], 0x8, &(0x7f0000000900)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @empty, @multicast1}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x63, [@empty]}, @timestamp={0x44, 0x18, 0xeb, 0x0, 0x8, [0xe44, 0x7b, 0x7fffffff, 0xfffffffa, 0x10001]}, @generic={0x88, 0x7, "0fe90048e9"}, @end, @timestamp_prespec={0x44, 0xc, 0x45, 0x3, 0x1, [{@multicast2, 0x73}]}, @timestamp_addr={0x44, 0x14, 0xf0, 0x1, 0x8, [{@empty, 0x2}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}]}]}}}], 0x78}, 0x40041) dup3(r4, 0xffffffffffffffff, 0x0) r8 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r8, 0x0) 14:27:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000006702000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:27:49 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xfeffffff) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:27:49 executing program 5: r0 = msgget$private(0x0, 0x8) msgrcv(r0, &(0x7f0000000380)={0x0, ""/243}, 0xfb, 0x0, 0x800) read(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd(r1, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:27:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:27:49 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r4) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc800}, 0x4) dup3(r5, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:27:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000048002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:27:49 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x87ffffc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000694c1a3547122747b08e4e073494f2ac8999d7009c5196903c2ed99ad4c19522c75bc6f979c6807a9891bc18efcd9d5e2f69fc960780520f996905aab611a112ad9e62e0b0657e33f2d9ebde28999ac27fedc6eda6b935e558e5a83227de0180000000000000b10cb55b819b6e541ff3f300ad", @ANYRES32, @ANYBLOB="06d20c0000006530000000000000000000"]) r1 = timerfd_create(0x8, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000280)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0x0) sendfile(r1, r0, &(0x7f0000000080)=0x5, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'batadv_slave_0\x00'}) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0)) read(r1, &(0x7f0000000300)=""/146, 0x92) syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'vxcan1\x00'}) 14:27:49 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="080004", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:27:49 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000880)={{}, 0x0, 0x26, @unused=[0xd69, 0xfffffffffffffffb, 0x3, 0x20], @name="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"}) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000, 0x1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000200)={0x6, 'veth0_to_bridge\x00', {0x84}, 0x55b3}) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xb0, r1, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x51a}, {0x6, 0x11, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8}, {0x6, 0x11, 0x40}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) sendmsg$DEVLINK_CMD_RATE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x44, r1, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @DEVLINK_ATTR_RATE_PARENT_NODE_NAME={0xf, 0xa9, @name2}, @DEVLINK_ATTR_RATE_PARENT_NODE_NAME={0xe}]}, 0x44}}, 0x800) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r2, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) r5 = dup2(r4, r3) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 3052.567819] loop6: detected capacity change from 0 to 4 [ 3052.583198] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3052.601313] loop6: detected capacity change from 0 to 4 14:27:49 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3052.644675] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3052.687295] tmpfs: Unknown parameter 'bond_slave_1' 14:27:49 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xffff8000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3052.788363] tmpfs: Unknown parameter 'bond_slave_1' 14:27:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000001d002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:27:49 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000100", @ANYRES32=r1, @ANYBLOB="04000000000000002e2f66696c653000"]) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) r5 = dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) openat(r5, &(0x7f00000000c0)='./file0\x00', 0x46800, 0x4) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:27:49 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000380)={0x3, 0x1}) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd(r1, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000003c0)={'syzkaller0\x00'}) dup2(r4, r3) r6 = getpid() r7 = perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x3, 0x6, 0x0, 0x0, 0x0, 0x6, 0x80015, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x4, 0x1ff}, 0x2000, 0x3f5, 0x7ff, 0x5, 0xfffffffffffeffff, 0x401, 0x1, 0x0, 0x10000, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x1) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xbc, 0x3, 0x9, 0x40, 0x0, 0x7, 0x1, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000000c0), 0xd}, 0x55104, 0x5, 0x1, 0x5, 0x0, 0x1, 0xd0de, 0x0, 0x20, 0x0, 0x7fff}, r6, 0xf, r7, 0x2) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3053.058175] loop6: detected capacity change from 0 to 4 14:27:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 3053.087676] EXT4-fs (loop6): invalid first ino: 4114797056 14:27:49 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:27:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000011d202000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:27:49 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040), &(0x7f00000000c0), 0x2, 0x2) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 3053.221250] tmpfs: Unknown parameter 'bond_slave_1' 14:27:49 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xfffff000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3053.302787] tmpfs: Unknown parameter 'bond_slave_1' 14:27:50 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x8}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 3053.445928] loop6: detected capacity change from 0 to 4 [ 3053.515751] EXT4-fs (loop6): invalid first ino: 4114797056 14:27:50 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3053.549788] loop6: detected capacity change from 0 to 4 [ 3053.576625] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3053.771924] tmpfs: Unknown parameter 'bond_slave_1' [ 3053.827051] tmpfs: Unknown parameter 'bond_slave_1' 14:28:06 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x3fffffffffffffd, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:28:06 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) waitid$P_PIDFD(0x3, r4, &(0x7f0000000140), 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:28:06 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:28:06 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xffffff7f) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:28:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x40400, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect(r1, &(0x7f0000000180)=@qipcrtr={0x2a, 0x2}, 0x67) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r3, 0x3, 0x0, 0x3) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000100)=0x102, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001780)={'veth0_to_bridge\x00'}) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/1786], 0x706) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:28:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000f602000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:28:06 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000700)={{0x0, 0x4, 0x6, 0x161, 0x1, 0x5bf8a5ac, 0xff, 0x4, 0x1000, 0xcb, 0x7, 0x1, 0x6, 0x3, 0x200}}) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:28:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 3069.726822] loop6: detected capacity change from 0 to 4 [ 3069.736084] tmpfs: Unknown parameter 'bond_slave_1' [ 3069.760095] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3069.772922] loop6: detected capacity change from 0 to 4 [ 3069.790099] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3069.796279] tmpfs: Unknown parameter 'bond_slave_1' 14:28:06 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xffffff8c) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3069.813516] device lo entered promiscuous mode 14:28:06 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3069.863426] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 14:28:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000fc02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:28:06 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x80, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, 0xffffffffffffffff) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r1, 0x44, 0x3, 0x3) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)=ANY=[@ANYBLOB="1200fefdbe517a015905", @ANYRES32=r5, @ANYBLOB="01040000000000002e2f66696c653000"]) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) pwritev(r6, &(0x7f0000000040)=[{&(0x7f0000000140)="53b657c854107c2cf7f435c919a61e09572bdb6fd981933843dbfc4c1703c60d2830744b4f34ab2fef334fb26d6be7007d951543de10b04c96d6cc0b475df3791db22bbe83fb3225c1d1850fba55136533880f27758928b1e8791c0362d22dbb96c04f22c2183d8c6a0d9005153095cbe15a64d2f398297a40d7", 0x7a}], 0x1, 0xb2, 0x200) dup3(r4, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:28:06 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) r5 = getpid() ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000140)=r5) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x505240, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:28:06 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e7e1fc40a6de4c28a2c3627f6ec42b47010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="44cc0b19c9a6cc97fb3990b8e8c506aa8f5db54b95bcccbc2e71f68cb97259ee96ac51055b695da2f0ce029ebae8cc1b9e8ef523beca208391f433f0b1a770540968f58eb8f65460e1a68a503607b5d7ab316546610df37963d4a1f7897708c9a02d379eb763eceba5d2e56637e58c9e922fa18053967fd73c20a7b1ad73c67b55fed52dca33deb578bbfc84eb7f292f", 0x90, 0x2}, {&(0x7f0000000240)="3f40923ab52fa870d7577b2eac74aa1ebb5b7a1ff75424f8928ce2de2e3402bff0846b84627c72bab536516b66049e22c8eeb91299d37b4b4259218ec866631ef3ca5cbcfa15517c1bd89c57ee47f3633427bb7fbe009073205bdeec8642b3ffda6cdecc973f04121209c6161da7553828e534e8c5db4885e443582df7", 0x7d, 0x9}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c646f6e77cda1a37391636a166dc96d7eb895e1ee9dd9fc251b268623e481", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1000) 14:28:06 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3070.038428] loop6: detected capacity change from 0 to 4 [ 3070.066929] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3070.119147] tmpfs: Unknown parameter 'bond_slave_1' [ 3070.135389] tmpfs: Unknown parameter 'bond_slave_1' 14:28:27 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x35, 0x81, 0x0, 0x0, 0x0, 0x5bff, 0x40080, 0x12, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000140), 0x1}, 0x4002, 0x8000, 0x1, 0x0, 0x100000000, 0x4, 0x5, 0x0, 0xffff, 0x0, 0x9000000000}, 0x0, 0x10, r2, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r5 = inotify_init1(0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r5, r4) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) r7 = getuid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{}, {0x2, 0x1, r7}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0xff, 0x1, &(0x7f0000000500)=[{&(0x7f0000000400)="321ecca4a21737391c2b4dacb8613ab7320ce8e9c9f8bafb47981158ba0a270f1bbca1e138002ade6992010a4a610932e55e69977fe74ab7ab32495616946595007526e1600c776bd0ff14c37732f21f6d9a57be3afd4d67b0ef70198bc69c9fdb68a8c032937a83e4bceb5bfcc6890b069aaa49980b3b731a64500017395efb8c51cb8b39e2c7a1ba56f309e7beacc77250dc4e2977e5868e2d23448558cb37ecef9ed8980a8e1dcb9359c511154ea6134c099a6c891c80e5b40d6c9ed5d9336d7eade2259fab33abee4edd027da473e79143ecc9cb55f7c05d30f3dc35f7fe852ff07116211cadd77e", 0xea, 0x179}], 0x1, &(0x7f0000000540)={[{@shortname_lower}, {@shortname_win95}, {@rodir}, {@shortname_win95}, {@utf8no}, {@shortname_win95}, {@shortname_mixed}], [{@fowner_lt={'fowner<', r7}}, {@smackfsroot={'smackfsroot', 0x3d, '!}\''}}, {@obj_role={'obj_role', 0x3d, '\xd4'}}]}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) sendfile(r3, r6, &(0x7f00000000c0)=0xbfc, 0xbe) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:28:27 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xffffffa1) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:28:27 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8280a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x5, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) r5 = dup2(r4, r3) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000001c0)}, {&(0x7f0000000300)="2d7ad7b5a8e4503739e41152871aeae6faaa9363c8392e1dda1f0ffe6bfef6123eb3103865053fa5637052063e664192df3068cad468388532ad135f238010798a1c68bba9e466adc2fc8aab3b59a64f10d1d3d517ab8903cf93aa2a8bc256ecb65e29c216b46a9f3c68780d79ba1db5a8f7bffdadee726364759aa6cf1f06d1790ac4673f4c08462cfe71d31000c21f7a756788a3e31eedd684c8a67093c3388128b57346013d0262e3fd67e4a63a906f1b49f02e8a9cbd3f24082c92090f47a9a792692dc0fcb485937860c4e8a6a8be84a74d51f5a08c66bc7abe9be9f2e22de739ea", 0xe4}, {&(0x7f0000000400)="4f83d5f7bd4a32199581224f5c3b54daab0891613e4e3c9246ef2d055bd7548799390341af8329fefb132f17fa6e81bbb7e526cef0fc39dc8703e2f63d7474b56b7563e09638116140007b77d573066f766bbae9bc1ff095281c08de9bb27151dc7aefab7726f523e7c0fd0fd210b9c6376b5b428df8c9d3720e1707340ea3198bc0a87921f4206f4990afd22050939ae893e717959e18b1d90e3c5930e58c219460971b14965751323a3a5e2e227e3429f0d0013ccbbdf266a5a0523b584e93b5", 0xc1}, {&(0x7f0000000500)="9097dd3b7b0671cc6e63523bb98b10cf12f6e3bbd323e28515209e5a2245ba644d162997d768c23c04320136dc69f040b38d25dcb64b75ca17c507994f4fe3b7b13717100bd7e4a0c4c4f1", 0x4b}, {&(0x7f0000000580)="c227fc9b8c4a49dced2919082f1d9a080f", 0x11}], 0x5, 0x6, 0x80000007) fallocate(r6, 0x3, 0x0, 0x3) dup2(r6, r4) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e2d0bd98460301000000000000002e30"]) renameat(r1, &(0x7f0000000040)='./file0\x00', r8, &(0x7f0000000140)='./file0\x00') 14:28:27 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x4, 0x1, &(0x7f0000000180)=[{&(0x7f0000000380)="efd3ad46b8ef102634c13208f832602a1977c32395574fc173220806f555f5323750a88fb8a9fcc5f50174dbc8e73e3b8064679ef6210975eb9d9f5dbd6d3de60bf4519c0dd221742078a71c174836f8dfda89b3cdfa83ebf42cbe16f56944640c4e1c4be9d5ff993e1424fcd4c11ddba28530642ec3168c7d27e13fc501c9516d80b6eff7e7f8ae282f587082fc60b0ef174f47ea8d55ebe58c3b56f0dc95fc9eeb3e6fd5d64b71c545dc1b72951d874ca48140cf0a30bed500d4090be63444eb", 0xc1, 0x10000}], 0x20081, &(0x7f00000004c0)={[{@shortname_mixed}, {@shortname_win95}, {@shortname_win95}, {@utf8}, {@shortname_win95}, {@fat=@tz_utc}, {@uni_xlate}, {@utf8}, {@rodir}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@uid_lt={'uid<', r2}}]}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:28:27 executing program 1: sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, 0x0, 0x20000040) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x7, 0xff, 0x3, 0x0, 0x9, 0x20110, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x40, 0x1, 0x9, 0x4, 0x3, 0x2, 0x1, 0x0, 0x9, 0x0, 0xfff}, r1, 0x1, r0, 0x9) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r2, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f0000000300)={0x2, 0x3f, 0xc, &(0x7f00000002c0)=""/12}) socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r3, 0x3, 0x0, 0x3) close(r3) open(&(0x7f0000000240)='./file0\x00', 0x44001, 0x4c) r4 = syz_io_uring_setup(0x7179, &(0x7f0000000600)={0x0, 0x132c, 0x1, 0xff7ffffe, 0x4000169}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000340), &(0x7f0000000540)) syz_io_uring_setup(0x695, &(0x7f00000004c0)={0x0, 0xb41c, 0x0, 0x0, 0xa2, 0x0, r4}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000380), &(0x7f0000000440)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff6000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x2]}, 0x8, 0x0) 14:28:27 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:28:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000fffe02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:28:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, 0x0, 0x0) [ 3090.759768] loop6: detected capacity change from 0 to 4 [ 3090.786822] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3090.825231] loop6: detected capacity change from 0 to 4 [ 3090.843632] EXT4-fs (loop6): invalid first ino: 4114797056 14:28:27 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3090.887200] tmpfs: Unknown parameter 'bond_slave_1' 14:28:27 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xfffffff6) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:28:27 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) r7 = getgid() mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x300084, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r7}}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) [ 3090.957270] tmpfs: Unknown parameter 'bond_slave_1' 14:28:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000feff02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:28:27 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0xdc, 0x3, 0x1, 0x30, 0x0, 0x7f1, 0x4010, 0xd, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x7, @perf_config_ext={0x10001, 0xda}, 0x800, 0x7, 0x8, 0x2, 0x3f, 0x240, 0x81, 0x0, 0x1, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 3091.066984] loop6: detected capacity change from 0 to 4 [ 3091.083693] EXT4-fs (loop6): invalid first ino: 4114797056 14:28:27 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file2\x00', 0x101, 0x50) pwritev(r0, &(0x7f0000000780)=[{&(0x7f00000000c0)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r0, 0x3, 0x0, 0x3) dup2(r0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd(r1, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000380)=0x0) r7 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0xfffffffffffffe98, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x10000001, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r7, 0xc, 0xffffffffffffffff, 0x9) r8 = getpgid(r6) ptrace$getsig(0x4202, r8, 0x4, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:28:27 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:28:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, 0x0, 0x0) 14:28:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000202000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3091.264431] tmpfs: Unknown parameter 'bond_slave_1' [ 3091.315658] tmpfs: Unknown parameter 'bond_slave_1' 14:28:45 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xfffffffb) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:28:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, 0x0, 0x0) 14:28:45 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001500)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001400)="44dc511aed91d5b20b1ed3d61fe6e85321e0dea355577449c8f46937c411a97d9ff265e192caa4707827705f6289452a3bfc4f82a7c35e16c7a112c59b06e3d02ba801e3b2398372157ec8df3ef2c094744be603d56f43c4b56ed757e7bf6c159db01061b07f41d363ef456c4b515b785e1dd2f89fbc75874a83fdb5a62c9dfdb86f52fb26444be820ce45ec05a5d83563632a14c0c643b2258847aa83e2481a58d8961699a0cbd730cd9bc3408f435ebfa1d12013980c2c648eeeb1a9cc446f4515582364376b3c76dc4ca897268b78a3", 0xd1, r0}, 0x68) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x535081, 0x151) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000001740)={{}, {0x5}, 0x80, 0x0, 0x0, &(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000001580)="5f6d1631127d9f80b77ba944fa5ce0e4a9604311b8399e579356999d49a3add6238b430e686678a4cde4351c80dd111a3827c75c9f0f4845e7cbeadcd4fe", 0x3e, 0x0, &(0x7f00000015c0)={0x2, 0x10e, {0x0, 0xc, 0x56, "1eaaf2bacd16864f48b5282f08dbd493ff1ac534cb54b128a97178c5d2e8cae47ffb5b870464c59b37b25bb57f77d64ff24df03e9a5582d040a59aa7fe323eabc13f4942c3234803daf65de7a13c6fb89a506c3c6000", 0xab, "c8bf28e6e8a81ad6d9c6d648e0f4a666f4e573dc8225b971c797892eccfa737207c337f6c1ae5235ddce8412eac62b8bc7f35cf6c34fdafc49a1993d5a24eb31ffc53ba826771fd66b243a75997ac36f19bab0ddf43a04bd0c4420abebba527d7add6503375bdd657585a1671e9bfceb1ff1aefbcf9eb77c86ee2746880847b2ef927bb3793db05f45f6e722552482a3d9061fcea202c7461bd30b48bdf798d38b4c31e02406aa8d3677ba"}, 0x65, "1b1c6b354cb0f38bf515fe057a9aff57a12b76a7d0ef4e98b477cf4df3c0fcf8467ec4a4e669c535332e4ea9c9d47f32614bb1d1ced6db851f7067258c277a692f32dd5fbc46b4338d80214ee92133697e0a8405176dc193da48007ec43896d90bfd723b5e"}, 0x17f}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) pread64(r3, &(0x7f0000000380)=""/4096, 0x1000, 0x6) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f00000000c0)={0x0, 0xfffffff8, 0x1, 0x6}, 0x10) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001380)={0x5, 0x80, 0xe0, 0x3f, 0xc1, 0x25, 0x0, 0x400, 0x20002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x4}, 0x4, 0x84, 0xb54, 0x4, 0xff, 0x0, 0x7, 0x0, 0x7, 0x0, 0x6b9}, 0x0, 0xb, r0, 0x1) ioctl$BTRFS_IOC_SYNC(r3, 0x9408, 0x0) 14:28:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='sysfs\x00', 0x201059, 0x0) pivot_root(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file1\x00') 14:28:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000302000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:28:45 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:28:45 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x80000000002, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:28:45 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) [ 3109.034878] loop6: detected capacity change from 0 to 4 [ 3109.050697] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3109.071339] loop6: detected capacity change from 0 to 4 [ 3109.084664] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3109.107139] tmpfs: Unknown parameter 'bond_slave_1' 14:28:45 executing program 1: ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, 0x0) mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ff6000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000080), 0x77c, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r0, 0x3, 0x0, 0x3) write$binfmt_aout(r0, &(0x7f00000000c0)={{0x107, 0x0, 0x1f, 0x183, 0x1c, 0x9, 0x1ee, 0x2}, "e2c369b2135b62bb999355252a781436b06de823ce691f6c94ff8937568ab6c442740afd6e161e3ad6289ae099a6281192ccf87009cb83dabe7611edab99686fd401a19ab04ff3f2d95a15fabbd99e8d3b3b05216bc41e94288ee1dd7e677c9111ac99c42b68341c67d1a99339dfdd24d19c71179fd843a5e9ca9c28b8ffc1279cfd8e631e8d9cd43832eae32db12adfe44dbdc81fa0073fd07ac856b7ba19a5b88299d92b195f0c78df62bb1c4c0e563bc5b732407b2861b16556f85731b4d87195e54c3f0d9f4c6ee0f7316108156c"}, 0xf0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_BTRFS_WITH_PARENT_ROOT={0x28, 0x4e, {0x9, 0x1, 0x3, 0x1, 0x400, 0x3}}, 0x664003) mlock2(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x0) 14:28:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000402000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3109.163422] tmpfs: Unknown parameter 'bond_slave_1' 14:28:45 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xfffffffe) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3109.246457] loop6: detected capacity change from 0 to 4 [ 3109.263869] EXT4-fs (loop6): invalid first ino: 4114797056 14:28:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:28:45 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = inotify_init1(0x0) r6 = dup2(r5, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:28:45 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) openat(r2, &(0x7f0000000180)='./file0\x00', 0x280000, 0x31) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(r4, 0x3, 0x0, 0x3) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_async', 0x410000, 0x80) inotify_add_watch(r4, &(0x7f00000000c0)='./file0\x00', 0x8000091c) socket$nl_netfilter(0x10, 0x3, 0xc) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:28:45 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext={0x101, 0xe587}, 0xc49c2af55dabcbbb, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r3, r2) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)=0x3) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000000c0)={'gre0\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r6 = socket$unix(0x1, 0x5, 0x0) r7 = dup3(r5, 0xffffffffffffffff, 0x0) r8 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x24018, &(0x7f0000000380)=ANY=[@ANYRES16=r4, @ANYRES16, @ANYBLOB="398f3fc5c8722eaf43863dfd80a8b50347f5185f7743533829370cd0cec49ebe4e3fb74df095d3231b373d8ac2c637a6a0d19bc50f3df8f1a9b1f9c1b1c0abc78763e73e8bf1d5ead5", @ANYRES64, @ANYBLOB="c058e788178f505f62b5048886f2db367e9dfc5f68cbd7806cba562c548bb8a7fb1317546b882860d2e1efa140d7f34322a37aab387c88265b00"/72, @ANYRES16=r1, @ANYRES16=r3, @ANYRESOCT=r7, @ANYRES16=r6]) symlinkat(&(0x7f0000000000)='./file0\x00', r8, 0x0) 14:28:45 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:29:02 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x1000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x100, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) socket$nl_generic(0x10, 0x3, 0x10) 14:29:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:29:02 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:29:02 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)=ANY=[]) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'veth0_to_batadv\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000140)='./file0\x00', r5, 0x0) 14:29:02 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)={'nat\x00', 0x2, [{}, {}]}, 0x48) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x5c) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x5c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void, @val={0xc, 0x99, {0xa7, 0x2e}}}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x57}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x6e}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x9}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x42}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000000}, 0x8000) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:02 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", ""]}, 0x14}}, 0x20000000) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000502000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3125.760082] tmpfs: Unknown parameter 'veth0_to_batadv' 14:29:02 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) symlinkat(&(0x7f00000000c0)='./file0\x00', r4, 0x0) [ 3125.784949] loop6: detected capacity change from 0 to 4 [ 3125.800883] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3125.807814] tmpfs: Unknown parameter 'veth0_to_batadv' [ 3125.812850] loop6: detected capacity change from 0 to 4 [ 3125.827744] EXT4-fs (loop6): invalid first ino: 4114797056 14:29:02 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:29:02 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x8000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000602000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3125.978288] tmpfs: Unknown parameter 'bond_slave_1' [ 3126.009889] tmpfs: Unknown parameter 'bond_slave_1' [ 3126.053195] loop6: detected capacity change from 0 to 4 [ 3126.081719] EXT4-fs (loop6): invalid first ino: 4114797056 14:29:17 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) openat(r4, &(0x7f00000001c0)='./file0\x00', 0x84001, 0x3f) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x8, &(0x7f00000018c0)=[{&(0x7f0000000380)="fb3423d6ca08fd0b3f73fa7c4f8e0663ad2e704ce5bf08c5de35b2eecf0d77204529862252c714d65443b31a0289a4a03d3646ecf4f76974c7080d8d981026da80a8678883368db3dfd015cf80045814453beeaa86c4f04480323cc8f3b4f71e225f35524aa538abbe954d9ac6f03ec090806dcda34a0e6f234cf32b04644940e9686c71266787ba4e0077b4a6a6a669d7bd85f783ac5f51f4180c75584cb056868e5fb2a520f2d231edbb110925389974a0b16d08ea1bb210656731cbb406b958c7617698a94737", 0xc8, 0x8}, {&(0x7f0000000480)="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", 0x1000, 0xffffffffffffff93}, {&(0x7f0000001480)="e027fbb177dd95eab742105704f6a5ed5aa3e00ca160b7349a22264bc824f97bb0643f4ee3db07a19d2668de1fb291e78e5e6e8c0bef1bae77b7226d52682a2c8986c8e70dc44919c32edf5708d0cf1bdfaef9391e7e9d79b02e28dd86e69dcd73a8435ed2586f65dff0c92a1270863e9da21faffcd77506173e574730dd44d2069bf55e79770d43ded629fca0b613ab52b5d53c8ba57465c1d7c2", 0x9b, 0x9}, {&(0x7f0000001540)="6e3e1ad52f8959f78f02df10514ca870d3cc30c2bd52ee14fc16340fa3ca202271486f9d8a4a8d5c9536c4d5d7e48f896edd39a96f2fa24d41a1827f0215176e2b72070845a4ed8ebe076ec1c3f76335d6f49421f3a30c76a5127c0b8de2deb77d936c181a2c1243af77006f3d8e135ac3d75fac09299d242d7773751ce35140e5d0a65626d9f792", 0x88, 0x3}, {&(0x7f0000001600)="ec448d2958e58b849e6f55c67059adb3c6a2c20605bed1271f071d5e9c4f4f3eec42065d066f61c3b9ee47294330c8b05aabe5c2b41d213c228c6dd4475d8d04047bded31e9989fad8706be73334055088234c4bbedcfe2af3011c2523f26c190e8603c36c3955a1c3ad600879608dca8728600fa44a9fa0f6d248681910dbd1256cd8e239fd6017c26dd7108cc8fc89f82e1821810d661d3eceb42ba2d0da957aaf736a36e2c924641046bd80c9af7bee2d", 0xb2}, {&(0x7f00000016c0)="57e64d70b507fbaa16357e1b3d83fac22ec54c22ca28ca4c21e1364440cba5ba9ff49d558bd4609f65a88a865a4255726f8bb61a000c7003c86a1342da252fef4189e04981babb9f190f913f2bdf4b3926c71bdcbeae1d0fd653a3eff164b9c2d14575ae92f27cf81f25cf2c9c66430a96bf3e783830763a9eb9e4f2f127a3d311f33ece308b6b90674c457ae8b743626d5592cec20df244525fbadbbf36b063b7901e791bc264bf142e3b676c54b54c6054844f4f7cf3e2f694c80d85fd84801bb631d794403bc4c047dfac1efacdc9d3582e06e7838314843e3152", 0xdc, 0x80000000}, {&(0x7f00000017c0)="669fa8a82bf0968825a57586fe917075d6768bd828ea7779c1a04d60b1fdd12c1b65502bb9db5b6f5536a33b7f6b3e87088f6ae9310aaea5967b89c40ed69d6e73999d1952a4f3972ee0a1d1d3034020acf7d1e8d44515d0e79eeaa833618dff9096dfe1021483717c727090c308e25e9929e6122118d6e3196e09409589dfd321e4f4036b749693fedb5ed44e50039070aafa8b8b3ee958afaaf282962f7b064b8a3911fd65ed1b8e4cd14b84695ab182cb51600ea36c53df4ab74b50aa3e2675fa36d27cb7a06643d4", 0xca, 0x7718}, {&(0x7f0000000180)="34fa389373bc6abff1d49e8e6835e8539a376e49b673c844f962", 0x1a, 0x9}], 0x810080, &(0x7f0000001980)={[{@nouser_xattr}, {@noinit_itable}, {@journal_checksum}, {@nodiscard}, {@noacl}, {@acl}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '$'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@uid_lt={'uid<', 0xee00}}, {@appraise_type}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000001a40)=0x200000) [ 3140.941041] Bluetooth: hci0: Malformed LE Event: 0x0b [ 3140.946045] Bluetooth: hci0: SCO packet for unknown connection handle 200 [ 3140.947486] Bluetooth: hci0: Malformed LE Event: 0x0b 14:29:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000702000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:29:17 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8, 0x41, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x48080, 0x0, 0x3, 0x9, 0x1020000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x9, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', r2) r3 = inotify_init1(0x0) r4 = dup2(r3, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:29:17 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x20000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:17 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x410200, 0x14) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x11}, @hci_ev_le_direct_adv_info={{}, {0x20, 0x0, @any, 0x0, @fixed}}}}, 0x14) syz_emit_vhci(&(0x7f0000000080)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x73}, "231e63972e39d5a9b1f3d8790ec0d99989e3b5bbd7c55efeffbee1f3687df51552d589f7b7d1824a29d12d38d959b5690961b8ee0b28210df48dbbc15c46ab2269efc3299ff7d7b22036ba06d33fbe99da67fb81bb27371987c4ea9c4a8faa9860dee2a10ffd7c58b6509d5819b6e909aaecbb"}, 0x77) 14:29:17 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:29:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:29:17 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsu(&(0x7f00000000c0), 0x3f, 0x20000) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:29:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x4d, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000000)={0x7, 'wlan0\x00', {0x5}, 0x1000}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x5, 0x6c4f608c, 0xb, 0x9, 0x4, 0xd75}, {0x6, 0x9, 0x1, 0x25eb000000000000, 0x9, 0x6}], ['\x00', '\x00']}) write$bt_hci(r2, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x13) write$bt_hci(r0, &(0x7f0000000200)={0x1, @user_passkey_reply={{0x42e, 0xa}, {@any, 0x4}}}, 0xe) getpid() preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x7, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7a, 0x3b}}, './file0\x00'}) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x8008662c, &(0x7f0000000040)={0x10}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/mdstat\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180), r4) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) fork() [ 3140.949838] Bluetooth: hci0: SCO packet for unknown connection handle 200 [ 3140.984941] loop6: detected capacity change from 0 to 4 [ 3140.996279] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3141.010027] loop6: detected capacity change from 0 to 4 [ 3141.019024] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3141.062398] tmpfs: Unknown parameter 'bond_slave_1' 14:29:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000802000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:29:17 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = open$dir(&(0x7f00000000c0)='./file0/../file0\x00', 0x121000, 0x104) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r5, 0x3, 0x0, 0x3) renameat(r4, &(0x7f0000000140)='./file0\x00', r5, &(0x7f0000000180)='./file0\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x40, 0x8, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:17 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x80ffff00000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3141.114020] tmpfs: Unknown parameter 'bond_slave_1' 14:29:17 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x80) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:29:17 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x180) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:29:17 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3141.314973] loop6: detected capacity change from 0 to 4 14:29:17 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r0, 0x3, 0x0, 0x3) r1 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x460001, 0x41) r2 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = signalfd(r2, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000380)=0x4) r4 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@md5={0x1, "d5b2d21c70d857c8d8dd548f01202090"}, 0x11, 0x3) r5 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r5, r4) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3141.339315] EXT4-fs (loop6): invalid first ino: 4114797056 14:29:17 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xf0ffffffffffff) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x4d, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x49, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000000)={0x7, 'wlan0\x00', {0x5}, 0x1000}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x5, 0x6c4f608c, 0xb, 0x9, 0x4, 0xd75}, {0x6, 0x9, 0x1, 0x25eb000000000000, 0x9, 0x6}], ['\x00', '\x00']}) write$bt_hci(r2, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x13) write$bt_hci(r0, &(0x7f0000000200)={0x1, @user_passkey_reply={{0x42e, 0xa}, {@any, 0x4}}}, 0xe) getpid() preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x7, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7a, 0x3b}}, './file0\x00'}) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x8008662c, &(0x7f0000000040)={0x10}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/mdstat\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180), r4) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) fork() [ 3141.560054] tmpfs: Unknown parameter 'bond_slave_1' [ 3141.614832] tmpfs: Unknown parameter 'bond_slave_1' 14:29:35 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x200000, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x1004, &(0x7f0000000480)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@debug={'debug', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xcc2}}, {@cache_none}, {@version_L}, {@access_user}, {@version_9p2000}, {@access_user}], [{@obj_user={'obj_user', 0x3d, 'tmpfs\x00'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:29:35 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x14, 0x800) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000140)={'wg2\x00', {0x2, 0x0, @initdev}}) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x5b8081, 0x4) inotify_init1(0x0) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r3, 0x0) 14:29:35 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsu(&(0x7f00000000c0), 0x3f, 0x20000) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:29:35 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x100000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 14:29:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000b02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:29:35 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:29:35 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0xfffffd05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) signalfd4(r4, &(0x7f00000000c0)={[0x80]}, 0x8, 0x800) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) [ 3158.617794] loop6: detected capacity change from 0 to 4 [ 3158.624730] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3158.631893] loop6: detected capacity change from 0 to 4 [ 3158.646872] EXT4-fs (loop6): invalid first ino: 4114797056 14:29:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000001802000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:29:35 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="0400000000000000080002", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:29:35 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) r4 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f00000000c0)={@loopback, @loopback}, 0xc) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3158.748292] tmpfs: Unknown parameter 'bond_slave_1' [ 3158.793839] loop6: detected capacity change from 0 to 4 [ 3158.795055] tmpfs: Unknown parameter 'bond_slave_1' [ 3158.799498] Zero length message leads to an empty skb [ 3158.810474] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3158.845484] tmpfs: Unknown parameter 'bond_slave_1' 14:29:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000001c02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:29:35 executing program 1: keyctl$reject(0x13, 0x0, 0x1, 0x0, 0xfffffffffffffff8) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000340)={0x0, 0x2, 0x177a6c76, 0x1}) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000180), 0x8, 0x800) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x101800) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x5}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x5, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) close(r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r4 = syz_io_uring_setup(0xfa7, &(0x7f0000000080), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) io_uring_enter(r4, 0x100001, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x541b, &(0x7f0000002440)={{0x2, 0x0, @loopback}, {0x0, @link_local}, 0x0, {0x2, 0x0, @empty}, 'wlan0\x00'}) 14:29:35 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="0400000000000000080002", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3159.077089] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 14:29:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 14:29:50 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000180)='./file1\x00', 0x6, 0x3, &(0x7f0000001500)=[{&(0x7f0000000380)="74aae5ca427465ca1c924d07b0dc3233159541c6dee14afc0a27643abfd9d8c399276d5d2ee9ee1903d2ac1e7434d1339f42ffad8bd9e60074768234793a20da8971dd207d39abce0f53c811708412ced48aa58474dfb9ade9ed044c001d15d1808a613d79675e259c0403787dfe89d69cc5dbaa916da2de338d457fdd32b1a92d80bbeb52cccf96de4d4db6c2e08b451c93b963e098c18cd3aaa76e7889ca13419f020cc59edff428e957ff5a7f76a507d683", 0xb3, 0x10000}, {&(0x7f0000000440)="55229e88244ac0cae129f2095848ab4e0fa8930ba895364d52c1135084f23f0db1e6fddc32ad06f2cc96f31534743cea3e4d0979fc7c66153a1f21af25db153b81074eea72e30e03ff086c8ddba2458d6547a4a5d4b374bd8b665b594811caaf504d32303f3456860c1a023f7d9fc678cf7e8ffd0c313e348e7269cab6a6a1ea577194aeb8cf1b5de788a1be2972e29ff7da", 0x92, 0x9}, {&(0x7f0000000500)="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", 0x1000, 0x80000000}], 0x200000, &(0x7f0000001580)={[{}, {'^-'}, {'bond_slave_1\x00'}, {':'}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@euid_gt}, {@euid_gt={'euid>', 0xee01}}]}) ioctl$BTRFS_IOC_SCRUB_CANCEL(r2, 0x941c, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x2, 0x92) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:50 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x200000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:50 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="0400000000000000080002", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:29:50 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) inotify_init1(0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) r3 = dup2(r2, r2) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:29:50 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010048cb6ff5611c49f03d02576ac80000000000000200000001133d7236fd6fa7ec97bf4f7a72821c9046f47c02259a647758b4180115ff95f9a738a60d8b13278a8e5df41f3a22c9e8da9c06923f3c5fbbe95ac239f5cb", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004000000000010000200000000002000020000000000"], 0x3c, 0x0) sendmsg$nl_netfilter(r4, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="58000000110605002bbd7000fbdbdf25030000023a00918009f774254d661bc9a401cb8e01602877cba7125728a501df1fa751bf73aab4ba30301cb5473ca20253ae91f55db3c9f64f62a171ae30000008009100", @ANYRES32=0x0, @ANYBLOB], 0x58}}, 0x4000000) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:29:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000006202000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:29:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r2) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000000)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r8, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r5) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r7, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x64, r9, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_DEVKEY={0x28, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}]}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x64}, 0x1, 0x0, 0x0, 0x18040}, 0xc880) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000001500ea0000258c0800200800020175258dd79adbc0fa75713834b5d1ad5576cd3b43e3426d97a6175ae75e21d8f1987bbfd1856cbdeac563f27d1034c110692f566453be6f008553c55779ad3178e35d8db71716ba86defc39ae7c2a3cb672318e0599b32329376dd69791a4bdbbbbb9d7f45cff6fdb97a1c93e3f36280407e424c1455b3179ad6f4534f89f296b65eb194402154ef370f5f32c6b352a198a8105b79a995c80dfa9159a1f", @ANYRES32=r6, @ANYBLOB="0500290000000000"], 0x24}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x54}, 0x1, 0x0, 0x0, 0x8004}, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r3) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x140000000000000, 0x0, 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)=@v3={0x3000000, [{}, {0x0, 0x2}]}, 0x18, 0x0) [ 3173.617391] loop6: detected capacity change from 0 to 4 [ 3173.627931] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3173.651460] loop6: detected capacity change from 0 to 4 [ 3173.658822] EXT4-fs (loop6): invalid first ino: 4114797056 14:29:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000006702000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3173.724490] tmpfs: Unknown parameter 'bond_slave_1' 14:29:50 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3173.759886] tmpfs: Unknown parameter 'bond_slave_1' 14:29:50 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="0400000000000000080002", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3173.824180] loop6: detected capacity change from 0 to 4 14:29:50 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x430, 0x0, 0x0, 0x2, 0x4, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000140), 0x20000000, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) socket$unix(0x1, 0x2, 0x0) 14:29:50 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3173.878687] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3173.887958] loop6: detected capacity change from 0 to 4 [ 3173.896655] EXT4-fs (loop6): invalid first ino: 4114797056 14:29:50 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x300000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:29:50 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x8, 0x6, 0x40, 0x5, 0x0, 0x1f, 0x80000, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f00000003c0), 0x3}, 0x40000, 0x9, 0x0, 0x8, 0x8, 0x4, 0x40, 0x0, 0xa, 0x0, 0x1ff}, 0x0, 0xb, r1, 0x8) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) r5 = getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x9) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r6, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r6, 0x3, 0x0, 0x3) clone3(&(0x7f0000001ec0)={0x42000000, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000300), {0xc}, &(0x7f0000000340)=""/35, 0x23, &(0x7f0000000380)=""/31, &(0x7f0000001e80)=[0x0, r5, r5, 0x0, r5, 0x0, r5, 0x0, 0x0], 0x9, {r6}}, 0x58) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:29:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000f602000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3173.990042] tmpfs: Unknown parameter 'bond_slave_1' [ 3174.011094] loop6: detected capacity change from 0 to 4 [ 3174.021065] tmpfs: Unknown parameter 'bond_slave_1' [ 3174.024166] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3174.035997] loop6: detected capacity change from 0 to 4 [ 3174.039219] EXT4-fs (loop6): invalid first ino: 4114797056 14:29:50 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f00000000c0)={[0x6]}, 0x8, 0x80000) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:29:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 14:29:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000fc02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3174.176774] loop6: detected capacity change from 0 to 4 [ 3174.228012] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3174.283211] tmpfs: Unknown parameter 'bond_slave_1' 14:30:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:30:12 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:30:12 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) r5 = getpid() r6 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0xc, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x6, 0x1, 0x1, 0x8, 0x0, 0x80000001, 0x14008, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x4080, 0x9, 0x4, 0x9, 0x8, 0x1, 0xf1f, 0x0, 0xe5, 0x0, 0x3}, 0x0, 0x1, r4, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, r5, 0x8, &(0x7f0000000200)={0x18, 0x3, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x814070, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYBLOB="c5b6faed708ff781c3de947bd56b1e5fdada61a5177472bfef510dadd92938ef527eded94c2fc7f1ab793479604e20f62a210f7e95f9903d41f82d", @ANYRESHEX=r6, @ANYRES32=r0, @ANYBLOB="f01ab71e07af25364a2d5283d5e5c8360e8524fd82060df8f98dba7d41dc2fbb86101d2111afa708ea33a2953a9f761f77c8dc5ee40119c029ade9f9222c2f421609c15a0fe988f156d4d3db85f8602e991dbccca5ef01025e3e559b1d78da81d4e3f4cc241a625b4cfd1c65c534ab86d90f120e4e28c8078f6afccb178384499c2f0a42d58978a6d8f9472aeacaf2cc337c8f7ff405ed5a32fbc491b7", @ANYRES32, @ANYRESDEC]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) 14:30:12 executing program 1: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100070000000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB='./file0\x00']) r1 = perf_event_open(&(0x7f0000000080)={0x4, 0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000003c0), 0x9}, 0x1}, 0x0, 0x3, r0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x110, 0xffffffffffffffff, 0x5ccc8000) clone3(&(0x7f00000016c0)={0x200089000, &(0x7f0000001280), &(0x7f00000012c0), &(0x7f0000001340), {0x7}, &(0x7f0000000480)=""/229, 0xfffffffffffffe07, &(0x7f0000000440)=""/44, &(0x7f00000003c0)}, 0x58) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/63, 0x3f}], 0x1, 0x0, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000580), 0x10200, 0x0) syz_io_uring_setup(0x293e, &(0x7f0000000180)={0x0, 0x76ba, 0x20, 0x4000, 0x2ec, 0x0, r2}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) socketpair(0x6, 0x6, 0xa7, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r4, 0x8983, &(0x7f00000008c0)={0x1, 'syzkaller0\x00'}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000380)={0x14, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0806000000000000000000000000000000ed"], 0x39, 0x0, &(0x7f0000000340)="0002ef3bbae4ecf2e5428fb0fc2b34f0e240d5410523a78755c0ebb622b589f3cd1cc6869e024407809ef5ed1cad69516f16a3345f1e77a59d"}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/module/thermal', 0x22401, 0xc0) getsockname$packet(r5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000640)=0x14) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000840)={0x9, 0xfffffffeffffffff}) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x1020) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000680)={0x24, @long={0x3, 0xffff, {0xaaaaaaaaaaaa0002}}}, 0x14, &(0x7f00000007c0)={&(0x7f00000006c0)="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", 0xfa}, 0x1, 0x0, 0x0, 0x20000004}, 0x5) 14:30:12 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x400000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:30:12 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)={{0x10b, 0x3f, 0x3f, 0xdf, 0x2cd, 0x3, 0xb4, 0x8}, "63c80ba53c79f45c5367a555385f667e8b4256a9ad5d5d5b6fb073d6bd2c6452484e1aa27f8b18e7da5b8127c32055c4189a226836e4b803a67912bb129fadcbb9e465a8ce1e5072f11692d6cb2b0d4c015b64157f3e3d88ed5297a914320db9ea45fee786df459b968ae7391aba11f797037724407a9041f225076599be2a88e4e5925ca7c1ba03954b9d8c2ae77cce8518aca5ea982a1b89901682d7553fd973a9647efffe8e427f3d1b524c71ccb5", ['\x00', '\x00']}, 0x2d0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r4, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) statx(r4, &(0x7f00000007c0)='./file0\x00', 0x3000, 0x200, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010005000000000002000300", @ANYRES32=0xee01, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="5352e367", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0xee00, @ANYBLOB="02000300", @ANYRES32=r5, @ANYBLOB="040000000000000008000500", @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000600", @ANYRES32, @ANYBLOB="10000400000000002000020000000000"], 0x8c, 0x3) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r9 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r9, 0x0) 14:30:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000fe02000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:30:12 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f0000000880)={{r4}, 0x0, 0x26, @unused=[0xd69, 0xfffffffffffffffb, 0x3, 0x6], @name="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"}) r5 = openat(r4, &(0x7f0000000080)='./file0\x00', 0x40000, 0x1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f0000000200)={0x6, 'veth0_to_bridge\x00', {0x84}, 0x55b3}) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), r4) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r5, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xb0, r6, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x51a}, {0x6, 0x11, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8}, {0x6, 0x11, 0x40}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="b4000000", @ANYRES16=r6, @ANYBLOB="250a0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300010000000e0001006e6574646576736907000000000000006e657464657673696d30000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200"/174], 0xb4}, 0x1, 0x0, 0x0, 0x10044040}, 0x845) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3195.714727] loop6: detected capacity change from 0 to 4 [ 3195.733922] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3195.742633] loop6: detected capacity change from 0 to 4 [ 3195.758919] EXT4-fs (loop6): invalid first ino: 4114797056 14:30:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000003000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:30:12 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:30:12 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)={0x40, 0x3, 0x14}, 0x18) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000002) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 3195.903442] loop6: detected capacity change from 0 to 4 [ 3195.914309] EXT4-fs (loop6): invalid first ino: 4114797056 14:30:12 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r1, 0x3, 0x0, 0x3) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f00000000c0)={0x7, 'veth0\x00', {0x9}, 0x3f}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) r5 = dup3(r4, 0xffffffffffffffff, 0x0) openat(r5, &(0x7f0000000040)='./file0\x00', 0x80000, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:30:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000005000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:30:12 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x500000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3196.047239] tmpfs: Unknown parameter 'bond_slave_1' [ 3196.081424] tmpfs: Unknown parameter 'bond_slave_1' 14:30:12 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000040)=0x9e) r3 = inotify_init1(0x0) r4 = dup2(r3, r1) getpid() ptrace$setsig(0x4203, 0x0, 0x1ff, &(0x7f0000000200)={0x20}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:30:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000006000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:30:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 3196.189225] loop6: detected capacity change from 0 to 4 14:30:12 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x228, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x20000008, &(0x7f0000000200)={0x7, 0x0, 0x4}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)=0x3) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:30:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="db", 0x1}, {0x0}], 0x2, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x40, 0x9b, 0x4, 0x40, 0x0, 0x9, 0x2000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xdd, 0x1, @perf_config_ext={0x9, 0x4}, 0x46004, 0x3, 0x7ff, 0x0, 0xffffffffffffffff, 0x3, 0x7ff, 0x0, 0x1f, 0x0, 0x1000}, r3, 0xf, 0xffffffffffffffff, 0xb) lsetxattr$security_ima(&(0x7f0000000040)='./file1\x00', &(0x7f0000000240), &(0x7f0000000280)=@v2={0x5, 0x1, 0x10, 0xffff, 0x9a, "6ce24489c130f3aa249a1e2bf6748a240944c1966f6267e9be1078b938ba9cdf458ce7dde8278b59313ecd0039f5dda0f737c651d9d7985a7a907c9325373a23b9af15824efabd8f1e2277750cb886ceb5554b2e93cdc06b60df6b35f82302c270aed171f9fa4341f85ed00a3ef218c8a7012dc7ace0883103e594df803617923b0a76c75d8eb73f3b472a69984ca69ec512c5184d9caeeba907"}, 0xa3, 0x3) memfd_create(0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) sendfile(r1, r1, 0x0, 0x100000) 14:30:12 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r0, &(0x7f0000000a00)='.\x00', 0x500, 0xe) r1 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x64}, 0x2000, 0x100007fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r1, 0xc, 0xffffffffffffffff, 0xb) r2 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x80}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = signalfd(r2, 0x0, 0x0) r4 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r6 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r6, r5) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$binfmt_aout(r7, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x217) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x2, 0x0, &(0x7f0000000880), 0x35, &(0x7f0000000380)=ANY=[@ANYBLOB="621f6e641029d74c646972656374aa433ab6ba587311e1eff173646f6e745f6d65617372652c3d626f6e645f736c6176655f09000000000000007970653d626f6e645f736c6176655f31002c646f00"]) [ 3196.236397] tmpfs: Unknown parameter 'bond_slave_1' [ 3196.244632] tmpfs: Unknown parameter 'bond_slave_1' [ 3196.253803] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3196.277939] loop6: detected capacity change from 0 to 4 [ 3196.294794] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3213.197837] loop6: detected capacity change from 0 to 4 14:30:29 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x80, 0x2) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r4, 0x80089419, &(0x7f00000000c0)) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:30:29 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:30:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r4, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:30:29 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r1 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r1, 0xc, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3, 0x67, 0x8, 0x9, 0x0, 0xd8, 0x45000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x7, 0x6}, 0x214, 0x9, 0x5, 0x1, 0x80000001, 0x448, 0x9e4a, 0x0, 0xfffff90f, 0x0, 0x7}, r1, 0x5, r0, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000000140)=""/187) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:30:29 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x600000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:30:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000007000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:30:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) r1 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x80540, 0x1) pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x251, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r4 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8e, &(0x7f00000007c0)={0x0, 0xb5f1, 0x8, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$HIDIOCGUCODE(r1, 0xc018480d, &(0x7f0000000240)={0x3, 0x3, 0x6, 0xfffffffc, 0x100, 0xe55}) sendfile(r5, r1, &(0x7f0000000380)=0xb7b, 0x5) fallocate(r4, 0x8, 0x0, 0x8800000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000940)="1a6a7478cebe", 0x6}], 0x1, 0x1ce0000, 0xffffffff) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, &(0x7f00000008c0)=0x10001) sendfile(r2, r2, 0x0, 0x100000) 14:30:29 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f0000000140)) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x40, 0x84) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 3213.206295] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3213.219275] loop6: detected capacity change from 0 to 4 [ 3213.225696] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3213.380326] tmpfs: Unknown parameter 'bond_slave_1' [ 3213.401960] tmpfs: Unknown parameter 'bond_slave_1' 14:30:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x0, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:30:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000f000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:30:48 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x10, 0x1) set_mempolicy(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x4d031, 0xffffffffffffffff, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0x8, 0x0) 14:30:48 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x202100, 0xe6) r2 = inotify_init1(0x0) dup2(r2, r1) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x238, 0x14, 0x10, 0x70bd2c, 0x25dfdbfb, {0x1, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "14fb3f271d22a2b5a935da93e5ebf6a694c5b0893497ae19ded4e9a21180047db450f8ded5a5c6e7b05b3e98d2e82df8ee18fd0e1952986d2bb071186145468da3b2c9fbd676431b4f89dca4260cc667e2ef9388dbd939f878c305ce0ab90beb892e1682d8a07707c9e833b158274397c1c5b3763b567819dcc659b748d6b6fe70276eebc2aae65f3613d2816315ca50988367aff1524bd6a673aa9c173d519d1fe7991983d020dc7542f6a85fcdc230687cd9d19d6b610b3ba43ff5d6ae72dfa76a7e7d3eb81a691d69b8484ffc4340"}, @INET_DIAG_REQ_BYTECODE={0x55, 0x1, "6cedd1e2c83f3ef751e59f425e4be452280c58b403c10c0dfe28940add216bf06ba14a8991be9169dba699a3f4e9121d5e4b875a6e50e7bdca1ab63d9162a967251de8530393b8bf32e551634d098cb131"}, @INET_DIAG_REQ_BYTECODE={0xf8, 0x1, "36627f92778fa9b7c1f9c30f71f638729d1beee1c6245f147cc19b8366788bbc48998a360be59e5836e9b4445de7180057d8b22e9e47751b46d06533ebc461fe1f5e6cc42bc603150e48dc0bf9c57ab5b07fb80907a09ac231934d779af6f898478cd5fe85399b664a2413661c505172fbd1baf97fa009a6c4ff8748766bb734968b32f1e465574e68cc5994e78f3fe04a3aabe0c0a80e92e6a04298e71cfc01e4c12fb5df50c88d92f8e06c8e32e9da79b6b052b43b538899ee5dbb4096f7e077ff2ebbeeb6a2ff1351f91d99828dee00a17ec62b3bfe1cc085d52c5114e7c1204a61b7dd360d58ecb59311db9abf20cb96cd6b"}]}, 0x238}, 0x1, 0x0, 0x0, 0x8080}, 0x81) socket$unix(0x1, 0x5, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) symlinkat(&(0x7f0000000000)='./file0\x00', r3, 0x0) 14:30:48 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) close(0xffffffffffffffff) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:30:48 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r3, 0xc, 0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) r5 = openat$cgroup_int(r1, &(0x7f0000000140)='cpu.weight.nice\x00', 0x2, 0x0) kcmp(r3, r4, 0x6, r0, r5) dup2(r2, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000380)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:30:48 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x700000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:30:48 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3232.030699] loop6: detected capacity change from 0 to 4 14:30:48 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) r5 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x7, 0x20000) open_tree(r5, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r6, 0xffffffff, &(0x7f0000000200)={0xf, 0x4, 0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) [ 3232.050401] EXT4-fs (loop6): invalid first ino: 4114797056 14:30:48 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) dup3(r4, r1, 0x0) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:30:48 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x804000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3232.088354] loop6: detected capacity change from 0 to 4 [ 3232.097752] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3232.117784] tmpfs: Unknown parameter 'bond_slave_1' 14:30:48 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3232.158034] tmpfs: Unknown parameter 'bond_slave_1' 14:30:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', 0x26e1, 0x0) syncfs(r0) 14:30:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000003000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:30:48 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x1d, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) openat(r4, &(0x7f00000000c0)='./file0\x00', 0x400000, 0x4) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:30:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x0, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:30:48 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:30:48 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x1000000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3232.364397] tmpfs: Unknown parameter 'bond_slave_1' 14:30:49 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) r5 = dup2(r4, r3) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) getpeername(r2, &(0x7f0000000140)=@caif, &(0x7f00000000c0)=0x80) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x80, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 3232.394208] loop6: detected capacity change from 0 to 4 [ 3232.412425] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3232.436477] loop6: detected capacity change from 0 to 4 [ 3232.446463] EXT4-fs (loop6): invalid first ino: 4114797056 14:30:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x40001, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f00000000c0)={r0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) statx(r2, &(0x7f0000000100)='./file0\x00', 0x668d4e3f0aa05717, 0x8, &(0x7f0000000300)) close_range(r2, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000000)='./file0\x00', 0x108) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/keyboard', 0x46040, 0xa4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r3, 0xc, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xb, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000002c0)={0x0, 0x700000000}) 14:31:05 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:31:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000004000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:31:05 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$F2FS_IOC_GET_PIN_FILE(r3, 0x8004f50e, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), 0xc) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:31:05 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:31:05 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0xf5, 0x1f, 0x80, 0x2, 0x0, 0x5, 0x20800, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x80, 0x4, 0x1000000, 0x6, 0xd8, 0x7, 0x8d1, 0x0, 0x6}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xb) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:31:05 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x1201000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:31:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x0, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:31:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000001640)={0x6, 0x0, 0x0, 0x0, 0x6, 0x89}) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = epoll_create(0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000e8ffffff00000000000000000000000000e300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/192]) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x20000000}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000001600), 0x400000, 0x0) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xff, 0x1, 0x6a, 0x1, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000140)}, 0x200, 0x0, 0x1000, 0x5, 0x7ff, 0x81, 0x6, 0x0, 0x4, 0x0, 0x2}, 0x0, 0x0, r3, 0x2) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3248.840828] loop6: detected capacity change from 0 to 4 14:31:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000003000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3248.877355] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3248.886086] tmpfs: Unknown parameter 'bond_slave_1' [ 3248.903099] loop6: detected capacity change from 0 to 4 [ 3248.922437] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3248.946847] tmpfs: Unknown parameter 'bond_slave_1' 14:31:05 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000600)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0xfffffffffffffde2) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) clone3(&(0x7f00000004c0)={0x0, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), {0xd}, &(0x7f0000000380)=""/241, 0xf1, &(0x7f00000001c0)=""/11, &(0x7f0000000480)=[0xffffffffffffffff], 0x1, {r3}}, 0x58) dup2(r2, r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000580)="bef37bb3e311ffa4596aa508933190fcf036913d8f4e1a067f2431caaf7f53ad9e1135956d3e14809221ba55d2882336ac2c5f710aa4ac048eedfa776569b64373af3efd79a0e26a15319154314ba891bb92ede7ff332a1eae0db8a35592ead6e99de3757558e13f73a89371a151d08af8eb93af8d", 0x75}], 0x1, 0x1ce0000, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r5, 0xf, 0x4000004, 0xffffffff) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f0000000540)=0x6c8) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000640)={'bond_slave_0\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:31:05 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:31:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 1) 14:31:05 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffff9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0xc840}, 0x880) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r4, r3) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) 14:31:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000005000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:31:05 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x1800000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3249.115455] loop6: detected capacity change from 0 to 4 [ 3249.157913] tmpfs: Unknown parameter 'bond_slave_1' [ 3249.166500] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3249.175103] loop6: detected capacity change from 0 to 4 [ 3249.179155] EXT4-fs (loop6): invalid first ino: 4114797056 14:31:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000006000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:31:05 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3249.301270] FAULT_INJECTION: forcing a failure. [ 3249.301270] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3249.302460] CPU: 0 PID: 20666 Comm: syz-executor.4 Not tainted 6.2.0-rc1-next-20221226 #1 [ 3249.303026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3249.303588] Call Trace: [ 3249.303776] [ 3249.303944] dump_stack_lvl+0x8f/0xb7 [ 3249.304227] should_fail_ex.cold+0x5/0xa [ 3249.304529] _copy_from_user+0x2e/0x180 [ 3249.304830] copy_msghdr_from_user+0x89/0x150 [ 3249.305153] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 3249.305552] ? perf_trace_lock+0xf0/0x560 [ 3249.305868] ? perf_trace_lock_acquire+0xfd/0x530 [ 3249.306223] ? __pfx_perf_trace_lock+0x10/0x10 [ 3249.306564] ___sys_sendmsg+0xdd/0x1b0 [ 3249.306854] ? __pfx____sys_sendmsg+0x10/0x10 [ 3249.307183] ? lock_release+0x3b6/0x750 [ 3249.307469] ? __fget_files+0x24e/0x450 [ 3249.307755] ? __pfx_lock_release+0x10/0x10 [ 3249.308069] ? trace_lock_acquire+0x14c/0x1c0 [ 3249.308402] ? __pfx___fget_files+0x10/0x10 [ 3249.308717] ? lock_acquire+0x32/0xc0 [ 3249.309011] ? __fget_files+0x270/0x450 [ 3249.309312] ? __fget_light+0xe5/0x280 [ 3249.309612] __sys_sendmsg+0xf7/0x1d0 [ 3249.309892] ? __pfx___sys_sendmsg+0x10/0x10 [ 3249.310214] ? rcu_read_lock_sched_held+0x42/0x80 [ 3249.310573] ? trace_rcu_dyntick+0x1a7/0x250 [ 3249.310896] ? syscall_enter_from_user_mode+0x21/0x50 [ 3249.311258] ? syscall_enter_from_user_mode+0x21/0x50 [ 3249.311645] do_syscall_64+0x3f/0x90 [ 3249.311934] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3249.312325] RIP: 0033:0x7f04972fbb19 [ 3249.312594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3249.313868] RSP: 002b:00007f049482f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3249.314409] RAX: ffffffffffffffda RBX: 00007f049740f0e0 RCX: 00007f04972fbb19 [ 3249.314914] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3249.315416] RBP: 00007f049482f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3249.315920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3249.316421] R13: 00007ffe549767cf R14: 00007f049482f300 R15: 0000000000022000 [ 3249.316939] [ 3249.336742] loop6: detected capacity change from 0 to 4 [ 3249.357862] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3249.358200] tmpfs: Unknown parameter 'bond_slave_1' 14:31:06 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x2000000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:31:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000007000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:31:06 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 3249.576028] tmpfs: Unknown parameter 'bond_slave_1' [ 3249.599111] tmpfs: Unknown parameter 'bond_slave_1' 14:31:24 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) r5 = getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) pidfd_send_signal(r2, 0x3b, &(0x7f0000000140)={0x3d, 0xffff, 0x4ef}, 0x0) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES32=r5, @ANYRESHEX, @ANYBLOB="f9deafeb8b5e77441b32b27b124ef2b5ce924bc2a24fedd89c13fcf0530dae17d37de8d8b822dabafa24f6ae6bb0d48e855d9d9134f3a95ce1f5617dd1cdd497caf12dd170c636fa281237336d24eace92f70ac58ce023a72c45620ed28a1af664da8ba076dccc181046da98a99c74035f2c90cb430b455c921faeadfa84b69d5b22dded7235afacd24c5589c243ad8b6c7571ffd137c1906dd06cfd519055eccef5bbb514f71882cb6390513fc607e1ec5150fa0393b44b62e9e81f627ed676a1a0ff6b2da6974139775211175cfcd7bbc42da96dd8f7bf3bb4", @ANYRES64=r0, @ANYBLOB="dd47a78069bb4a4709bb27fbb1ec5aeb89dfeeff20777a5109e82c3f60a0d82a20baec4540006e42a6ecce17c2e415c5ac879e86c253980453c59dfbe0e2c54095114cf87e7e285ead17dedd1c8d16426ac1b8202c705d48a26032bb6827c6092cd136cc856b65fda405831f67964699454e53da0b4aba027ad1f7fae544fe253e9fe80ff1e160d04b0768ebe9e7a8bf31281f0636c8a7910503cc92c2aec7a3c94f63e78307d2eea0cff8dd559fee5d7b0cbab94bf3fec097715c7bbc08bd036749b96d82d47a0ffa024485c11fb745a0b6c707b28f5723454dc1d6d10bfe9f", @ANYRES16]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) ioctl$FICLONE(r2, 0x40049409, r3) 14:31:24 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r2, r1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:31:24 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x2103000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:31:24 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd4(r0, &(0x7f0000000000)={[0x6]}, 0x8, 0x800) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="73ac99d1e17b71e714e4ffff0100000000080000000000000000"], 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000340)=""/66, 0x42}, {&(0x7f0000000140)=""/8, 0x8}], 0x2, 0x4, 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x24e1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)=0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x5810, r3, 0x62bb3000) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000003c0), &(0x7f0000000400), 0x2, 0x1) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x3) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x181080, 0x2) openat(r5, &(0x7f0000000480)='./file0\x00', 0x321082, 0x44) fallocate(r4, 0x0, 0x0, 0x87ffffc) finit_module(0xffffffffffffffff, &(0x7f0000000180)='\x00', 0x2) syz_io_uring_setup(0xfa7, &(0x7f0000000080), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0xb7, 0x1, 0x2, 0x9, 0x0, 0x6, 0x1010, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x6, 0xfff}, 0x4012, 0x0, 0xff, 0x7, 0xed, 0xf9ad, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) 14:31:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 2) 14:31:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000f000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:31:24 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:31:24 executing program 0: r0 = gettid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1f, 0x3, 0x39, 0xff, 0x0, 0x9, 0x10040, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000300), 0xa}, 0xa020, 0x1ff, 0xaf, 0x7, 0x80000001, 0x2, 0x20, 0x0, 0x8, 0x0, 0x1}, r0, 0x5, 0xffffffffffffffff, 0x1) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r1, 0x3, 0x0, 0x3) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, r1, 0x0) signalfd(r2, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r4 = inotify_init1(0x0) r5 = dup2(r4, r3) getpid() ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="d5254978", @ANYRES16=0x0, @ANYBLOB="01002bbd7000fcdbdf2510756bbaf3df5ae79f000600fe8000000000000000000000000000bb08000500ac1414bb0500080002000000080003000100000014000600ff01000000000000000000000000000104000180080004006e0c0000d7ec2be37c52f2fad3466048995884fa1e5b1742b0218544a9a3379b4d15e57737a9878a8a74c13279192cea980b0f66a8af2fb0b2df744a91fa092c7233a28c1315997503db111a0fd447752c06539342a4efd447f02345588ca03aecd256d63ddb672b634d67313230257ea0fe94bea8d623cfcc3701700e6d52a8533288d661de63f9bbaeff5643d06fe31920ba2a4c0240b056a382412bfb634695e287ed593060e963a24da3f445ff531be021cf492570d6f3635b5a4b6e2dc47c0030a26ed1f10ef387eb4d060a5d1419c4b27b611e5ffef1e40343dcadcc8ce0f358"], 0x64}, 0x1, 0x0, 0x0, 0x84000}, 0x90) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 3267.573414] loop6: detected capacity change from 0 to 4 [ 3267.607923] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3267.631077] loop6: detected capacity change from 0 to 4 14:31:24 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3267.645994] tmpfs: Unknown parameter 'ÿÿë' [ 3267.650311] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3267.669333] FAULT_INJECTION: forcing a failure. [ 3267.669333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3267.670484] CPU: 0 PID: 20702 Comm: syz-executor.4 Not tainted 6.2.0-rc1-next-20221226 #1 [ 3267.671051] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3267.671598] Call Trace: [ 3267.671784] [ 3267.671953] dump_stack_lvl+0x8f/0xb7 [ 3267.672246] should_fail_ex.cold+0x5/0xa [ 3267.672543] _copy_from_user+0x2e/0x180 [ 3267.672838] iovec_from_user+0x23e/0x3c0 [ 3267.673130] ? __might_fault+0xd9/0x180 [ 3267.673430] __import_iovec+0x68/0x600 [ 3267.673729] ? __might_fault+0xa9/0x180 [ 3267.674014] ? lock_acquire+0x32/0xc0 [ 3267.674292] ? __might_fault+0xa9/0x180 [ 3267.674587] import_iovec+0x87/0xb0 [ 3267.674843] copy_msghdr_from_user+0xed/0x150 [ 3267.675163] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 3267.675520] ? perf_trace_lock_acquire+0xfd/0x530 [ 3267.675865] ? __pfx_perf_trace_lock+0x10/0x10 [ 3267.676194] ___sys_sendmsg+0xdd/0x1b0 [ 3267.676468] ? __pfx____sys_sendmsg+0x10/0x10 [ 3267.676793] ? lock_release+0x3b6/0x750 [ 3267.677083] ? __fget_files+0x24e/0x450 [ 3267.677366] ? __pfx_lock_release+0x10/0x10 [ 3267.677691] ? trace_lock_acquire+0x14c/0x1c0 [ 3267.678012] ? __pfx___fget_files+0x10/0x10 [ 3267.678316] ? lock_acquire+0x32/0xc0 [ 3267.678601] ? __fget_files+0x270/0x450 [ 3267.678899] ? __fget_light+0xe5/0x280 [ 3267.679190] __sys_sendmsg+0xf7/0x1d0 [ 3267.679467] ? __pfx___sys_sendmsg+0x10/0x10 [ 3267.679792] ? rcu_read_lock_sched_held+0x42/0x80 [ 3267.680145] ? syscall_enter_from_user_mode+0x21/0x50 [ 3267.680509] ? syscall_enter_from_user_mode+0x21/0x50 [ 3267.680869] do_syscall_64+0x3f/0x90 [ 3267.681145] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3267.681494] RIP: 0033:0x7f04972fbb19 [ 3267.681771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3267.682961] RSP: 002b:00007f0494850188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3267.683484] RAX: ffffffffffffffda RBX: 00007f049740f020 RCX: 00007f04972fbb19 [ 3267.683978] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3267.684463] RBP: 00007f04948501d0 R08: 0000000000000000 R09: 0000000000000000 [ 3267.684952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3267.685432] R13: 00007ffe549767cf R14: 00007f0494850300 R15: 0000000000022000 [ 3267.685947] [ 3267.723925] tmpfs: Unknown parameter 'ÿÿë' 14:31:41 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r5, 0x3, 0x0, 0x3) pwritev(r5, &(0x7f00000000c0)=[{&(0x7f0000000040)="71c848e3707876e0dd9b7bb1ae0efe23ae3e40ded39126245176eaa29617a03b488d0dbecb9b7b23379d9f0605aa3a66a1b8026c831c37db", 0x38}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000000300)="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", 0xfe}, {&(0x7f0000000140)="08ecc22bf528e94763a68f6aa809f9276694f2d14a3549dab56850a378c40bcc8ac0fb0c3aa6b837d8a909ae9ed3dffc55bf5425088229fd69a90287d5070bd7abee4018dd56b389df68147c91c07d8a0d38b072199ccc3b662ea51d92ab0fa54aa0443b", 0x64}], 0x4, 0x2, 0x4) 14:31:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000000400019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:31:41 executing program 5: close(0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000100)) 14:31:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x408000, 0x1cc) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 14:31:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 3) 14:31:41 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x10, 0xa, 0xc00, 0x0, 0x0, {0x2, 0x0, 0xa}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0xc024) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:31:41 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x2400000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:31:41 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3284.538358] loop6: detected capacity change from 0 to 4 [ 3284.562859] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3284.600167] loop6: detected capacity change from 0 to 4 [ 3284.616347] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3284.663116] tmpfs: Unknown parameter 'bond_slave_1' 14:31:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x81) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x3ffffff, 0x10001}) 14:31:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) accept$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) r5 = dup(r4) openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) sendmsg$FOU_CMD_DEL(r5, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, 0x0}, 0x8010) 14:31:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002020019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3284.745075] tmpfs: Unknown parameter 'bond_slave_1' 14:31:41 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x8b8}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f00000000c0)={0x1}) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 3284.798991] FAULT_INJECTION: forcing a failure. [ 3284.798991] name failslab, interval 1, probability 0, space 0, times 0 [ 3284.800632] CPU: 1 PID: 20743 Comm: syz-executor.4 Not tainted 6.2.0-rc1-next-20221226 #1 [ 3284.801707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3284.802966] Call Trace: [ 3284.803322] [ 3284.803638] dump_stack_lvl+0x8f/0xb7 [ 3284.804297] should_fail_ex.cold+0x5/0xa [ 3284.804973] ? __alloc_skb+0x21a/0x310 [ 3284.805626] should_failslab+0x9/0x20 [ 3284.806171] kmem_cache_alloc_node+0x5d/0x420 [ 3284.806796] __alloc_skb+0x21a/0x310 [ 3284.807320] netlink_sendmsg+0x9a2/0xe10 [ 3284.807898] ? __pfx_netlink_sendmsg+0x10/0x10 [ 3284.808548] ? __pfx_netlink_sendmsg+0x10/0x10 [ 3284.809170] sock_sendmsg+0x158/0x190 [ 3284.809706] ____sys_sendmsg+0x744/0x930 [ 3284.810273] ? copy_msghdr_from_user+0xfc/0x150 [ 3284.810908] ? __pfx_____sys_sendmsg+0x10/0x10 [ 3284.811539] ? perf_trace_lock_acquire+0xfd/0x530 [ 3284.812204] ? __pfx_perf_trace_lock+0x10/0x10 [ 3284.812843] ___sys_sendmsg+0x110/0x1b0 [ 3284.813381] ? __pfx____sys_sendmsg+0x10/0x10 [ 3284.814004] ? __fget_files+0x24e/0x450 [ 3284.814547] ? __pfx_lock_release+0x10/0x10 [ 3284.815131] ? trace_lock_acquire+0x14c/0x1c0 [ 3284.815747] ? __pfx___fget_files+0x10/0x10 [ 3284.816328] ? lock_acquire+0x32/0xc0 [ 3284.816865] ? __fget_files+0x270/0x450 [ 3284.817423] ? __fget_light+0xe5/0x280 [ 3284.817988] __sys_sendmsg+0xf7/0x1d0 [ 3284.818510] ? __pfx___sys_sendmsg+0x10/0x10 [ 3284.819136] ? syscall_enter_from_user_mode+0x21/0x50 [ 3284.819834] ? syscall_enter_from_user_mode+0x21/0x50 [ 3284.820548] do_syscall_64+0x3f/0x90 [ 3284.821074] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3284.821775] RIP: 0033:0x7f04972fbb19 [ 3284.822283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3284.824571] RSP: 002b:00007f049482f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3284.825549] RAX: ffffffffffffffda RBX: 00007f049740f0e0 RCX: 00007f04972fbb19 [ 3284.826471] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3284.827393] RBP: 00007f049482f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3284.828316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3284.829247] R13: 00007ffe549767cf R14: 00007f049482f300 R15: 0000000000022000 [ 3284.830259] 14:31:41 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:31:41 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x5e01000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:31:41 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000100)={0x2, 0xffffffff}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x9}, 0x0, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x47c781, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x7, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x48400, 0x0) [ 3284.929151] loop6: detected capacity change from 0 to 4 [ 3284.947040] EXT4-fs (loop6): invalid first ino: 4114797056 14:31:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x81) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x3ffffff, 0x10001}) 14:31:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002030019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) [ 3285.043432] tmpfs: Unknown parameter './file0' [ 3285.076311] tmpfs: Unknown parameter './file0' 14:31:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 4) 14:31:41 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x81, 0x3f, 0x7f, 0x0, 0x0, 0x0, 0x100, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x220, 0x401, 0xd308, 0x8, 0x7, 0x8, 0x5, 0x0, 0x50, 0x0, 0x3}, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4940c0, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)=0x1) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:31:41 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) r5 = getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r6 = getpgrp(r5) r7 = fsmount(r1, 0x0, 0x8) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3, 0x7, 0x6, 0x0, 0x0, 0x4, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x5}, 0x0, 0x0, 0x8, 0x7, 0x1000, 0x95f, 0x20, 0x0, 0x7fffffff, 0x0, 0x5}, r6, 0x2, r7, 0x0) r8 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r8, 0x0) [ 3285.312508] tmpfs: Unknown parameter 'bond_slave_1' [ 3285.347368] tmpfs: Unknown parameter 'bond_slave_1' [ 3285.431344] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:31:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002040019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:31:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 5) 14:31:58 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:31:58 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) openat$cgroup_freezer_state(r4, &(0x7f00000000c0), 0x2, 0x0) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x5, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:31:58 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x8004000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:31:58 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x57aa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x40, &(0x7f0000000240)=0x0) io_destroy(r2) r3 = eventfd2(0x8001, 0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) io_cancel(0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x401, r0, &(0x7f0000000580)="0c28c80116bc223e8152e64601ad6bbdc9bfc3e1239e16bf5e3cb3920be82b0148405286da1aacecba14503cdb62037125e2834d3618d8ce91b313a35b2dd9f2ffe25932fe75bde92a1433a61602", 0x4e, 0xb6c, 0x0, 0x2, r4}, &(0x7f0000000600)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x8000, 0xffffffffffffffff, 0x0, 0x0, 0x9}, &(0x7f0000000300)) io_destroy(r2) sync() io_setup(0xd29, &(0x7f0000000780)=0x0) r6 = memfd_create(&(0x7f0000000100)='/d\xb5>\xbb\xb3~\xa9\xa4O{\xc3\xad \xeb\xee\xeed\xf4\xaf\xf8\x81\xea|f\x1c\xe0\xc1\xd1\x19cr\xa1\x01\xc3g\x10#\xa1\xfa\xb2\xe7\xa4+\x9e\xd7\xa2\x04y\xc1\xcf-V\xc0\x18L\xce\xe2I\x19:\xe7\xc6F\x1a\x16!\x00\x9c*\x03\x1f\x94#\xf1\xcb\xc9\xf1\x16I\x85\xc8x\xe0\xc7\xc7z\xfa\t\x85\t\xfcM\b\x81\xd9d\xe25i\xe7\xb4M\xd1\xa4\xef\x0eW\x7f\x13\xa9>\xcf;+-\xf1gT\xd0\xcck\xb1Nq\xe2\x06\xdf\xc2\x01\x00\x00\x00\x00\x00\x00\x00\xe4\x9b\xab\xf7E\x1c\xb2,\xe4[|\xcc\x85{\xb3\x98\x139\xc4F\x9fE\xa7*\xed\x9b@\x8bH\xe5\xb5\xa7\xae\x11\xa7N\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf3Ef\x88fM\xc3\xd7\xb2\aa\xe5?{\x18}\x9b\x87\x83^\xd5 a& \xd9\xa5\xa2\x85P\xdc\x8bO\xcbi\x1d-\x0e\xd9\xd5\xb1\x8d\x81da\xf89\xc4\xaa\x81\xad\xda\xef\x860\x19\xc4\xb3\vW\x19\xae:\a\x89\xb2\x87\xf0\x8ch\xc7r\xf6K\x96\x7f\x15?\xdb\x95\x82\xe8\x10\xa7qX\x8b\xc2 \xb0\xe5(\x87\xfd_\\\x17Y\xf6\vc\xa1JG\xc2\x88\xbc\xb1\xf3\"\x1a~t\xed\xed?\xad&\x11\x06\xc6!n\xb4\xf8\"W&\xf9|\xc9\xed\xde\xd6\xac\xd9\xea\xe6\xff\xf9\xeb\xa8\xd1\xb5\xf6N\xac\v\x88\xfcH\xd2\xe5UL\xfd\xd1gD\x99\x89M\xfbpe]A\x90\x81\xcb\x136;;\x9e\x0f\xa7\x92\xe3\x19O\n\xae{\x17\xa2\xec\x00\x9b/\xff\x02)z\x04\xb5\xf7\xafU\xa2D\"@j\x19\xa0D\x87Dc\n\x92', 0x0) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x0, r6, 0x0}]) r7 = syz_open_dev$evdev(&(0x7f0000000340), 0x4, 0x104c0) io_cancel(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x5, 0xffff, r7, &(0x7f00000007c0)="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", 0x1000, 0x80000001, 0x0, 0x7, r3}, &(0x7f00000003c0)) io_setup(0xd29, &(0x7f0000000780)=0x0) r9 = memfd_create(&(0x7f0000000100)='/d\xb5>\xbb\xb3~\xa9\xa4O{\xc3\xad \xeb\xee\xeed\xf4\xaf\xf8\x81\xea|f\x1c\xe0\xc1\xd1\x19cr\xa1\x01\xc3g\x10#\xa1\xfa\xb2\xe7\xa4+\x9e\xd7\xa2\x04y\xc1\xcf-V\xc0\x18L\xce\xe2I\x19:\xe7\xc6F\x1a\x16!\x00\x9c*\x03\x1f\x94#\xf1\xcb\xc9\xf1\x16I\x85\xc8x\xe0\xc7\xc7z\xfa\t\x85\t\xfcM\b\x81\xd9d\xe25i\xe7\xb4M\xd1\xa4\xef\x0eW\x7f\x13\xa9>\xcf;+-\xf1gT\xd0\xcck\xb1Nq\xe2\x06\xdf\xc2\x01\x00\x00\x00\x00\x00\x00\x00\xe4\x9b\xab\xf7E\x1c\xb2,\xe4[|\xcc\x85{\xb3\x98\x139\xc4F\x9fE\xa7*\xed\x9b@\x8bH\xe5\xb5\xa7\xae\x11\xa7N\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf3Ef\x88fM\xc3\xd7\xb2\aa\xe5?{\x18}\x9b\x87\x83^\xd5 a& \xd9\xa5\xa2\x85P\xdc\x8bO\xcbi\x1d-\x0e\xd9\xd5\xb1\x8d\x81da\xf89\xc4\xaa\x81\xad\xda\xef\x860\x19\xc4\xb3\vW\x19\xae:\a\x89\xb2\x87\xf0\x8ch\xc7r\xf6K\x96\x7f\x15?\xdb\x95\x82\xe8\x10\xa7qX\x8b\xc2 \xb0\xe5(\x87\xfd_\\\x17Y\xf6\vc\xa1JG\xc2\x88\xbc\xb1\xf3\"\x1a~t\xed\xed?\xad&\x11\x06\xc6!n\xb4\xf8\"W&\xf9|\xc9\xed\xde\xd6\xac\xd9\xea\xe6\xff\xf9\xeb\xa8\xd1\xb5\xf6N\xac\v\x88\xfcH\xd2\xe5UL\xfd\xd1gD\x99\x89M\xfbpe]A\x90\x81\xcb\x136;;\x9e\x0f\xa7\x92\xe3\x19O\n\xae{\x17\xa2\xec\x00\x9b/\xff\x02)z\x04\xb5\xf7\xafU\xa2D\"@j\x19\xa0D\x87Dc\n\x92', 0x0) io_submit(r8, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x7a30ae777a01f4a8, 0x0, r9, 0x0, 0x0, 0xfffffffffffffffc}]) io_cancel(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xff, r1, &(0x7f0000000480)="0d92dd065f6826a22652c3c3369cd833645c034cfa05c63f48e976a7e8a4dd2ee6aa61f478e7fff25d14d63f130a29668d663ec6e7ff63476fa78cdb18d56e6d5a5419488571b357c321783526de06979fceeefed60784f699e8d98d6091e9861eabe30d4fb3a4f61785e6f48d720a7ef48e81fa3e45fec0202e9738e09d3f61fa53388b73c2f8affa2448edfbada6c1d486edd80482d693fa446bbecf6d1fa87d111c16ca6f83656086b5793c64ff57f638d2b354c2766d8b7a027fe7554fdb5df4ffbc9abffc1244fc6d859ccfc2", 0xcf, 0xb55, 0x0, 0x0, r3}, &(0x7f0000000200)) 14:31:58 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0xfc22, 0x6, 0x91, 0x797b, 0x9}) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:31:58 executing program 5: sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x33b}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) close(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r0, 0x0) close(r0) syz_io_uring_setup(0x7668, &(0x7f00000003c0)={0x0, 0x132c, 0x10, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000440), &(0x7f0000000480)) r1 = accept4(r0, &(0x7f0000000140)=@sco={0x1f, @none}, &(0x7f0000000200)=0x44, 0x40000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000540), 0x743bc2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x88880, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x40, 0x11d, 0x0, 0x0, 0x33f, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000840)={{{@in6=@empty, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f5095da18c9d7e1e4fef57e50a1949dccf69115b94c6350087d4ee57d648613d34b9772bf8f9540351a546449c8076764178d3583eebe97535ad", @ANYRES16=0x0, @ANYBLOB="000125bd7000fddbdf250800000008000500090000001c0002800800090000000000080008000800000005000d00000000000800040001800000080006004f0200000c000380050008000600000008000400130f000049d1ebcee0a672c763300854b7b8e934929d3d881daef2ac5db13519cf5cfeec4f693b54"], 0x5c}, 0x1, 0x0, 0x0, 0x41}, 0x2000800) 14:31:58 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x8cffffff00000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) [ 3301.629098] loop6: detected capacity change from 0 to 4 [ 3301.651909] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3301.707013] tmpfs: Unknown parameter 'bond_slave_1' [ 3301.707126] loop6: detected capacity change from 0 to 4 14:31:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xd7caeb63a745940, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) write(r0, &(0x7f0000000080)="01", 0x41030) [ 3301.725458] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3301.762763] tmpfs: Unknown parameter 'bond_slave_1' 14:31:58 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:31:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002050019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:31:58 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r5 = inotify_init1(0x0) r6 = dup2(r5, r4) getpid() ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x6, &(0x7f0000000200)={0xa, 0x8}) socket$unix(0x1, 0x5, 0x0) r7 = dup3(r6, 0xffffffffffffffff, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r7) sendmsg$IPVS_CMD_SET_INFO(r6, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x38, r8, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x20004800) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000440)='./file0\x00', 0x7) r9 = openat$cgroup(r3, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r9, {0x4}}, './file0\x00'}) 14:31:58 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x5, 0x1}, 0x5, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x125) r3 = inotify_init1(0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) open(&(0x7f0000000080)='./file0\x00', 0x40000, 0x4) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) readv(r2, &(0x7f0000000740)=[{&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f00000000c0)=""/60, 0x3c}, {&(0x7f0000000180)}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000440)=""/177, 0xb1}, {&(0x7f0000000500)=""/188, 0xbc}, {&(0x7f00000005c0)=""/126, 0x7e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000680)=""/29, 0x1d}], 0x9) dup3(r5, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f0000000700), &(0x7f0000000180)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) inotify_add_watch(r4, &(0x7f0000000140)='./file0\x00', 0x4) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 3301.889020] loop6: detected capacity change from 0 to 4 [ 3301.919299] EXT4-fs (loop6): invalid first ino: 4114797056 14:31:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002060019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:31:58 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040)="ae", 0x1, 0x8000044, 0x0, 0xffffffffffffff62) recvfrom(0xffffffffffffffff, 0x0, 0x51, 0x0, 0x0, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0xff, 0x9, 0xf8, 0x0, 0x9, 0x10090, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xb}, 0x401, 0x1200000000000000, 0x401, 0x0, 0x9467, 0x4, 0x800, 0x0, 0xfffffff8, 0x0, 0x9cfe}, 0xffffffffffffffff, 0xf, r0, 0x1) r2 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x1, 0x13, 0xfc, 0x0, 0x800, 0x40000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0x2000, 0x7fffffff, 0x9, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x3}, r2, 0xc, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x40, 0x1, 0x4, 0xea, 0x0, 0x1000, 0x20000, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x800, 0x1, @perf_config_ext={0x8001, 0x2}, 0x4, 0xfffffffffffffd4e, 0x101, 0x6, 0x8000, 0x157, 0x8000, 0x0, 0x200, 0x0, 0x7}, r2, 0x1, 0xffffffffffffffff, 0x5) pwritev(r1, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r1, 0x3, 0x0, 0x3) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240), 0x101000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) sendmmsg$inet6(r4, &(0x7f0000000580)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x200, @mcast2, 0x6}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000017c0)="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", 0x1000}, {&(0x7f00000002c0)="d852a42c0cb847290ec04d5d47ecc4f5277e81d209c9bff3d0cdad24b9027fa5985af42a14b61a381e111827b9db556fe16310cb01854394671f9c90caacb0dbc405a11f99754e2f175d52b2a2ac462d8f62d300609e2a", 0x57}, {&(0x7f0000000640)="addd4e1cf78cbd6a36d03fc5b9182baa1643fde1dc175eda519f306ed76ca5269988ab312dbb510bf3b645605cedca1d4b228c9111c82e3a9d1ba040afd943423585b78ac5f7b9e72d9be300e213dec19e099d262aebb67873074cd758344f70749498238887453845caa1439e1a883dce", 0x71}], 0x3, &(0x7f0000000400)=[@tclass={{0x14, 0x29, 0x43, 0xffff886f}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x2b, 0xa, 0x1, 0x6, 0x0, [@empty, @private2={0xfc, 0x2, '\x00', 0x1}, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local]}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}], 0x98}}], 0x1, 0x0) fcntl$setlease(r3, 0x400, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) 14:31:58 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:31:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 6) [ 3301.986087] tmpfs: Unknown parameter 'bond_slave_1' [ 3302.179329] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 3302.759091] tmpfs: Unknown parameter 'bond_slave_1' 14:32:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)='\"', 0x1}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc0900, 0x148) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x10010, r1, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(r1, &(0x7f0000000040)='\x00', 0x82000, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0xfffffdef) 14:32:16 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x9201000000000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:32:16 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:32:16 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:32:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002070019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:32:16 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:32:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 7) 14:32:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0xffffffb6, 0x2000002800}, {&(0x7f0000000300)="0d0ddb17ba4b56820fd7c1a40ca95586e7058b8a80d8a36e1b6b5224260e19ca4afb01f6635a19758c30078ac6ae6d43bb8de51cecde4d62ee94cf8b3de8fdb7756d4bbcb07cbb903ce6f0eb536c0569f64bc439970e8ad03ad4e3e697852e9928d6494fc200623fc80bbf7338b184da19002836b1680492f6229b9261784b409645d15780dc3b8b94d4716697cf3b", 0x0, 0x8000}, {&(0x7f0000000180)="552ca7bbdb590fe8ef73cd657b5facc4d2508824512571cf6d8ed72cd2c7f2f4c8d1ce504842bc4c24d871a3969714e23f02f8a6b5debf11c793", 0x0, 0x401}, {&(0x7f00000001c0)="7e34d9dcf2eb8d8856a6624a092691841935d9a2dcb09cb8da", 0x0, 0x48}, {&(0x7f0000000500)="451313777e8e87c715aa53c6c73555c3cffc55fac7db78b943ef5b994fa741e4c4dca3f4861c0a8195897c2b87dc18d2eeb9a5fbba84d1e92e5465a21c40071e004955f287d43dd14e93e4142ac8a24e061bf211a8daaf25adf4e9014576756daf85fa005deeaf3b76f1e7db7c58638a502be4aa789d0520070c45d4dba4268f16be60455c7ede8d10f13ef23b3c0b3b4b44653ce67417c12fade18a394c15bd2a0eecfbad2464c6ddb1ff4aa90d5fe6125721e54286561b100180f9cd6b54ef1667255ec049a9f123a06087132196e483ec6803c61c4cf0b90bc30bce3853007e7b93a0cd8040ac015f", 0x0, 0x5ad5}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000200), &(0x7f0000000240)='./file0/../file0\x00', 0x20, 0x5, &(0x7f0000000780)=[{&(0x7f0000000600)="4b9a46f7651b8b9e1675154dcc2d92e9ab5c7771cdea5418f3833cd2dee2cf06996025c2f10fefc05511969caaaed2d5ed2cec97f8215e742237a4b909527274217f9b5332562e59f3e138708063e86eca54470e2753903fb7aa87f063b70724c8a7f972a22bc6a646de10009756eb680e9bdcd112c4a2de04840a1df6d93a6ecaf6e12a46a74275319709", 0x8b, 0x6}, {&(0x7f00000003c0)="90c721", 0x3, 0x4}, {&(0x7f0000000400)="bdae86a48fe87173825b923900127f5796aa8be911329c135a46b695865c397dde9c853586f812c71ee35c73d8c18c89ff3eb38746e6b27fe627473c", 0x3c, 0x200}, {&(0x7f00000006c0)="51e800f1499982dfb70f772621b4e62d19dc0b40da950117c0e6b5bf05ced2a31b2b12ad4a3b02ea7b830002d342256bb3f74605506014b895aaee29bf1820710102d9bcd611e59c0db91574ba936bbf74f95fc057413386316adcb0bd25516474f401424be826a977fb73b65f4c3a4f9939df438eef7d0035c5fd4d24586f", 0x7f, 0x7f}, {&(0x7f0000000740)="cf7c76aa08b3c2a99a9028c708cde3e74efc104aed48723c4c6c2a", 0x1b, 0x3}], 0x1b24004, &(0x7f0000000800)={[{@nojoliet}], [{@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x34, 0x36, 0x64, 0x61, 0x37, 0x35, 0x31], 0x2d, [0x35, 0xb, 0x36, 0x37], 0x2d, [0x34, 0x64, 0x33, 0x62], 0x2d, [0x62, 0x6f, 0x37], 0x2d, [0x34, 0x32, 0x66, 0x65, 0x66, 0x66, 0x66, 0x66]}}}, {@euid_lt={'euid<', 0xee00}}, {@pcr={'pcr', 0x3d, 0x3b}}]}) r2 = openat(r1, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r0, 0x0, 0xfffffdef) 14:32:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f00000007c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x50, r1, 0x4, 0x70bd29, 0x7, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_USE_MFP={0x8, 0x42, 0x1}, @NL80211_ATTR_PREV_BSSID={0xa, 0x4f, @random="890fa4764159"}, @crypto_settings=[@NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x1}], @NL80211_ATTR_VHT_CAPABILITY={0x10, 0x9d, {0x2, {0x0, 0x3, 0x5, 0x200}}}, @NL80211_ATTR_USE_RRM={0x4}, @NL80211_ATTR_IE={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x10001, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x7, 0x7}, 0x18292, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[], 0x1c}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x3f5, 0x200, 0x70bd26, 0x25dfdbff, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20040800}, 0xd0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x10000027f) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', &(0x7f0000000480)={0x101000, 0x0, 0x3}, 0x18) openat(r6, &(0x7f00000004c0)='./file1/file0\x00', 0x200, 0x8) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) openat(r7, &(0x7f0000000000)='./file1\x00', 0x40640, 0x168) name_to_handle_at(r7, &(0x7f0000000500)='./file1/file1\x00', &(0x7f0000000540)=@nfs={0x90, 0x24, {0x7ff, 0x6, 0x5, 0x80, "f96ec2405f1edc7b51b819724467effed5b8388af21ee71862f4c95c5ebf1b099203374d05ff76a3c186293621be4f82105b84dd639f87905486ebeab6424997a3f897ca690231a4079d6059715994ae5529bc7b4b5f4a5ab833810bfb8c031d09d77d8f1c9f3565bbfa583ca51d3d05035768ca866b42a9f38f081aa40efa44"}}, &(0x7f0000000600), 0x1800) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x810, 0xffffffffffffffff, 0x8000) sendmsg$FOU_CMD_ADD(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r5, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_V4={0x8, 0x8, @private=0xa010101}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004001}, 0x40004) [ 3319.652913] loop6: detected capacity change from 0 to 4 [ 3319.687262] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3319.712763] loop6: detected capacity change from 0 to 4 14:32:16 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f00000000c0)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x1, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r5, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r5, 0x3, 0x0, 0x3) dup3(r5, r4, 0x80000) dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x805010, &(0x7f0000000140)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) [ 3319.729970] EXT4-fs (loop6): invalid first ino: 4114797056 14:32:16 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3319.768442] tmpfs: Unknown parameter 'bond_slave_1' [ 3319.796422] FAULT_INJECTION: forcing a failure. [ 3319.796422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3319.798069] CPU: 1 PID: 20867 Comm: syz-executor.4 Not tainted 6.2.0-rc1-next-20221226 #1 [ 3319.799120] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3319.800128] Call Trace: [ 3319.800461] [ 3319.800763] dump_stack_lvl+0x8f/0xb7 [ 3319.801282] should_fail_ex.cold+0x5/0xa [ 3319.801829] copyin+0x19/0x120 [ 3319.802047] tmpfs: Unknown parameter 'bond_slave_1' [ 3319.802257] _copy_from_iter+0x38b/0x1150 [ 3319.803176] ? __pfx__copy_from_iter+0x10/0x10 [ 3319.803768] ? __virt_addr_valid+0x183/0x340 [ 3319.804363] ? __virt_addr_valid+0x19d/0x340 [ 3319.804963] ? __virt_addr_valid+0x102/0x340 [ 3319.805561] ? __check_object_size+0x384/0x700 [ 3319.806177] netlink_sendmsg+0x876/0xe10 [ 3319.806738] ? __pfx_netlink_sendmsg+0x10/0x10 [ 3319.807362] ? __pfx_netlink_sendmsg+0x10/0x10 [ 3319.807969] sock_sendmsg+0x158/0x190 [ 3319.808476] ____sys_sendmsg+0x744/0x930 [ 3319.809017] ? copy_msghdr_from_user+0xfc/0x150 [ 3319.809619] ? __pfx_____sys_sendmsg+0x10/0x10 [ 3319.810233] ? perf_trace_lock_acquire+0xfd/0x530 [ 3319.810898] ? __pfx_perf_trace_lock+0x10/0x10 [ 3319.811507] ___sys_sendmsg+0x110/0x1b0 [ 3319.812037] ? __pfx____sys_sendmsg+0x10/0x10 [ 3319.812623] ? __fget_files+0x24e/0x450 [ 3319.813141] ? __pfx_lock_release+0x10/0x10 [ 3319.813696] ? trace_lock_acquire+0x14c/0x1c0 [ 3319.814301] ? __pfx___fget_files+0x10/0x10 [ 3319.814883] ? lock_acquire+0x32/0xc0 [ 3319.815413] ? __fget_files+0x270/0x450 [ 3319.815976] ? __fget_light+0xe5/0x280 [ 3319.816509] __sys_sendmsg+0xf7/0x1d0 [ 3319.817018] ? __pfx___sys_sendmsg+0x10/0x10 [ 3319.817636] ? syscall_enter_from_user_mode+0x21/0x50 [ 3319.818338] ? syscall_enter_from_user_mode+0x21/0x50 [ 3319.819038] do_syscall_64+0x3f/0x90 [ 3319.819562] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3319.820264] RIP: 0033:0x7f04972fbb19 [ 3319.820760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3319.823025] RSP: 002b:00007f0494850188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3319.824004] RAX: ffffffffffffffda RBX: 00007f049740f020 RCX: 00007f04972fbb19 [ 3319.824915] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3319.825816] RBP: 00007f04948501d0 R08: 0000000000000000 R09: 0000000000000000 [ 3319.826746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3319.827655] R13: 00007ffe549767cf R14: 00007f0494850300 R15: 0000000000022000 [ 3319.828601] 14:32:16 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xa1ffffff00000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:32:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0xfffffffffffffffd, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBTYPE(r1, 0x4b4c, &(0x7f0000000080)) syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x200083, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {0x4}}, './file1\x00'}) 14:32:16 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000002, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) 14:32:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002080019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:32:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x428, 0x1, 0x0, 0x0, 0x6, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcaceb3843a0a27d26af18e26c51db155af69e0000000000000000000000000000df63a36fd407eb99643bb3409a86448396cd1499fc9043822e14cf2dbe93dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b76a9611ccb029fc621b6cee142ab97f6cfd7af9248f2266539"], 0x28}}, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000020}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="33fb8a66", @ANYRES16=r2, @ANYBLOB="00082abd7000fddbdf25170000000a001a00ffffffffffff00000a001a0008021100000000000a001a00ffffffffffff00000a000600ffffffffffff00000a0006000802110000010000"], 0x50}}, 0x885) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x3d, 0x0, &(0x7f00000002c0)) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e24, 0x7, @remote, 0x8}, 0x1c) setsockopt$sock_int(r5, 0x1, 0x7, &(0x7f0000000040)=0x4, 0x4) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0x101) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000000)={0x0, 0xffff, 0x0, 0x1}, 0xc) [ 3319.971168] tmpfs: Unknown parameter 'bond_slave_1' 14:32:16 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140), 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/155, 0x9b}, {&(0x7f00000003c0)=""/237, 0xed}, {&(0x7f0000000040)=""/10, 0xa}], 0x3, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x50}, 0x10001) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) [ 3319.988400] tmpfs: Unknown parameter 'bond_slave_1' [ 3320.010117] loop6: detected capacity change from 0 to 4 [ 3320.030875] EXT4-fs (loop6): invalid first ino: 4114797056 14:32:16 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) 14:32:16 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r3 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/spurious', 0x50101, 0x48) symlinkat(&(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000180)='./file0\x00') r5 = dup2(r3, r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) r6 = getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, r6, 0x8, &(0x7f0000000200)={0x9, 0xffffffff, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) r7 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r7, 0x0) [ 3320.180392] tmpfs: Unknown parameter 'bond_slave_1' [ 3320.204284] tmpfs: Unknown parameter 'bond_slave_1' 14:32:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r2) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}}, 0x1011) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r5, &(0x7f0000000080)="01", 0x292e9) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000084) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x80c, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 8) 14:32:32 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) write$binfmt_aout(r1, &(0x7f0000000700)={{0x108, 0x7, 0x0, 0x3dc, 0x30b, 0x8b2b, 0x3, 0x82fc}, "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1820) r3 = inotify_init1(0x0) r4 = dup2(r3, r2) getpid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) r5 = dup3(r4, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r6, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x95) 14:32:32 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xf6ffffff00000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:32:32 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, 0x0, 0x776d3fc45287c5bf) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = dup2(r2, r1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r4, 0x0) 14:32:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) 14:32:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="2000000000020b0019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:32:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x268600, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r2, 0x3, 0x0, 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) r5 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000200), 0x44080, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r6, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r6, 0x3, 0x0, 0x3) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000240)=[r2, r3, r4, r1, r5, r6, r0], 0x7) getsockopt$inet6_buf(r1, 0x29, 0x1b, &(0x7f00000003c0)=""/4096, &(0x7f0000000040)=0x1000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000001780)=0x4000) 14:32:32 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3336.175523] tmpfs: Unknown parameter 'bond_slave_1' [ 3336.193399] loop6: detected capacity change from 0 to 4 [ 3336.206019] [ 3336.206166] ====================================================== [ 3336.206609] WARNING: possible circular locking dependency detected [ 3336.207042] 6.2.0-rc1-next-20221226 #1 Not tainted 14:32:32 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)=0x40000) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000000)={r1, 0x3, 0xffffffffffffffff, 0x8}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), r2) [ 3336.207381] ------------------------------------------------------ [ 3336.207938] syz-executor.1/20930 is trying to acquire lock: [ 3336.208326] ffff88800ffea170 (&journal->j_barrier){+.+.}-{3:3}, at: jbd2_journal_lock_updates+0x162/0x310 [ 3336.209030] [ 3336.209030] but task is already holding lock: [ 3336.209430] ffff88800ffe8b90 (&sbi->s_writepages_rwsem){++++}-{0:0}, at: ext4_change_inode_journal_flag+0x17f/0x550 [ 3336.210187] [ 3336.210187] which lock already depends on the new lock. [ 3336.210187] [ 3336.210789] [ 3336.210789] the existing dependency chain (in reverse order) is: [ 3336.211323] [ 3336.211323] -> #3 (&sbi->s_writepages_rwsem){++++}-{0:0}: [ 3336.211877] ext4_writepages+0x1a9/0x5b0 [ 3336.212235] do_writepages+0x1b4/0x6a0 [ 3336.212579] filemap_fdatawrite_wbc+0x14b/0x1b0 [ 3336.212957] __filemap_fdatawrite_range+0xba/0x100 [ 3336.213352] filemap_write_and_wait_range+0xa5/0x130 [ 3336.213793] __iomap_dio_rw+0x5ea/0x1bd0 [ 3336.214142] iomap_dio_rw+0x40/0xa0 [ 3336.214450] ext4_file_read_iter+0x2f4/0x4a0 [ 3336.214831] generic_file_splice_read+0x18b/0x4d0 [ 3336.215219] do_splice_to+0x1bc/0x240 [ 3336.215536] splice_direct_to_actor+0x2b0/0x8c0 [ 3336.215909] do_splice_direct+0x1bc/0x290 [ 3336.216248] do_sendfile+0xb1d/0x1280 [ 3336.216573] __x64_sys_sendfile64+0x1d5/0x210 [ 3336.216940] do_syscall_64+0x3f/0x90 [ 3336.217269] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3336.217692] [ 3336.217692] -> #2 (&sb->s_type->i_mutex_key#6){++++}-{3:3}: [ 3336.218222] down_read+0x9c/0x450 [ 3336.222040] ext4_bmap+0x52/0x470 [ 3336.222342] bmap+0xb0/0x130 [ 3336.222625] jbd2_journal_bmap+0xac/0x190 [ 3336.222970] jbd2_journal_flush+0x857/0xc10 [ 3336.223318] __ext4_ioctl+0x9db/0x43b0 [ 3336.223647] __x64_sys_ioctl+0x19e/0x210 [ 3336.223989] do_syscall_64+0x3f/0x90 [ 3336.224308] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3336.224722] [ 3336.224722] -> #1 (&journal->j_checkpoint_mutex){+.+.}-{3:3}: [ 3336.225269] mutex_lock_io_nested+0x14c/0x1330 [ 3336.225632] jbd2_journal_flush+0x19e/0xc10 [ 3336.225974] __ext4_ioctl+0x9db/0x43b0 [ 3336.226299] __x64_sys_ioctl+0x19e/0x210 [ 3336.226654] do_syscall_64+0x3f/0x90 [ 3336.226960] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3336.227401] [ 3336.227401] -> #0 (&journal->j_barrier){+.+.}-{3:3}: [ 3336.228053] __lock_acquire+0x2a02/0x5e70 [ 3336.228518] lock_acquire.part.0+0x11e/0x340 [ 3336.229005] __mutex_lock+0x136/0x14e0 [ 3336.229443] jbd2_journal_lock_updates+0x162/0x310 [ 3336.229980] ext4_change_inode_journal_flag+0x187/0x550 [ 3336.230563] ext4_fileattr_set+0x14fa/0x19f0 [ 3336.231042] vfs_fileattr_set+0x780/0xb90 [ 3336.231509] do_vfs_ioctl+0xfa6/0x15d0 [ 3336.231949] __x64_sys_ioctl+0x110/0x210 [ 3336.232406] do_syscall_64+0x3f/0x90 [ 3336.232840] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3336.233394] [ 3336.233394] other info that might help us debug this: [ 3336.233394] [ 3336.234147] Chain exists of: [ 3336.234147] &journal->j_barrier --> &sb->s_type->i_mutex_key#6 --> &sbi->s_writepages_rwsem [ 3336.234147] [ 3336.235412] Possible unsafe locking scenario: [ 3336.235412] [ 3336.235836] CPU0 CPU1 [ 3336.236169] ---- ---- [ 3336.236481] lock(&sbi->s_writepages_rwsem); [ 3336.236792] lock(&sb->s_type->i_mutex_key#6); [ 3336.237279] lock(&sbi->s_writepages_rwsem); [ 3336.237737] lock(&journal->j_barrier); [ 3336.238015] [ 3336.238015] *** DEADLOCK *** [ 3336.238015] [ 3336.238442] 4 locks held by syz-executor.1/20930: [ 3336.238799] #0: ffff88800ffde438 (sb_writers#3){.+.+}-{0:0}, at: do_vfs_ioctl+0xf6b/0x15d0 [ 3336.239444] #1: ffff88801c310400 (&sb->s_type->i_mutex_key#6){++++}-{3:3}, at: vfs_fileattr_set+0x14c/0xb90 [ 3336.240186] #2: ffff88801c3105a0 (mapping.invalidate_lock){++++}-{3:3}, at: ext4_change_inode_journal_flag+0x126/0x550 [ 3336.240981] #3: ffff88800ffe8b90 (&sbi->s_writepages_rwsem){++++}-{0:0}, at: ext4_change_inode_journal_flag+0x17f/0x550 [ 3336.241778] [ 3336.241778] stack backtrace: [ 3336.242088] CPU: 0 PID: 20930 Comm: syz-executor.1 Not tainted 6.2.0-rc1-next-20221226 #1 [ 3336.242654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3336.243197] Call Trace: [ 3336.243379] [ 3336.243546] dump_stack_lvl+0x8f/0xb7 [ 3336.243826] check_noncircular+0x263/0x2e0 [ 3336.244121] ? __pfx_check_noncircular+0x10/0x10 [ 3336.244466] ? __pfx_mark_lock.part.0+0x10/0x10 [ 3336.244821] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 3336.245157] __lock_acquire+0x2a02/0x5e70 [ 3336.245479] ? __pfx___lock_acquire+0x10/0x10 [ 3336.245818] ? perf_trace_lock_acquire+0xfd/0x530 [ 3336.246196] lock_acquire.part.0+0x11e/0x340 [ 3336.246541] ? jbd2_journal_lock_updates+0x162/0x310 [ 3336.246925] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 3336.247288] ? rcu_read_lock_sched_held+0x42/0x80 [ 3336.247661] ? trace_lock_acquire+0x14c/0x1c0 [ 3336.247995] ? jbd2_journal_lock_updates+0x162/0x310 [ 3336.248379] ? lock_acquire+0x32/0xc0 [ 3336.248666] ? jbd2_journal_lock_updates+0x162/0x310 [ 3336.249042] __mutex_lock+0x136/0x14e0 [ 3336.249341] ? jbd2_journal_lock_updates+0x162/0x310 [ 3336.249717] ? lock_is_held_type+0xdb/0x130 [ 3336.250038] ? jbd2_journal_lock_updates+0x162/0x310 [ 3336.250417] ? __pfx___mutex_lock+0x10/0x10 [ 3336.250745] ? lock_release+0x3b6/0x750 [ 3336.251039] ? jbd2_journal_lock_updates+0x154/0x310 [ 3336.251414] ? __pfx_lock_release+0x10/0x10 [ 3336.251738] ? __pfx_do_raw_write_lock+0x10/0x10 [ 3336.252092] ? lock_acquire+0x32/0xc0 [ 3336.252377] ? jbd2_journal_lock_updates+0xc5/0x310 [ 3336.252758] jbd2_journal_lock_updates+0x162/0x310 [ 3336.253129] ? __pfx_jbd2_journal_lock_updates+0x10/0x10 [ 3336.253529] ? _find_next_bit+0x11b/0x150 [ 3336.253851] ? lock_is_held_type+0xdb/0x130 [ 3336.254181] ext4_change_inode_journal_flag+0x187/0x550 [ 3336.254578] ? __ext4_journal_stop+0x10b/0x1f0 [ 3336.254924] ext4_fileattr_set+0x14fa/0x19f0 [ 3336.255261] ? __pfx_ext4_fileattr_set+0x10/0x10 [ 3336.255616] ? lock_acquire+0x32/0xc0 [ 3336.255914] ? down_write+0x157/0x220 [ 3336.256205] ? memset+0x24/0x50 [ 3336.256458] ? fileattr_fill_flags+0x27f/0x320 [ 3336.256799] vfs_fileattr_set+0x780/0xb90 [ 3336.257111] ? __pfx_vfs_fileattr_set+0x10/0x10 [ 3336.257476] ? memset+0x24/0x50 [ 3336.257735] do_vfs_ioctl+0xfa6/0x15d0 [ 3336.258036] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 3336.258359] ? inode_has_perm+0x171/0x1d0 [ 3336.258694] ? __pfx_file_has_perm+0x10/0x10 [ 3336.259029] ? __pfx___fget_files+0x10/0x10 [ 3336.259349] ? lock_acquire+0x32/0xc0 [ 3336.259646] ? selinux_file_ioctl+0xb5/0x260 [ 3336.259977] __x64_sys_ioctl+0x110/0x210 [ 3336.260283] do_syscall_64+0x3f/0x90 [ 3336.260571] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3336.260952] RIP: 0033:0x7fb7c8f92b19 [ 3336.261230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3336.262500] RSP: 002b:00007fb7c6508188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3336.263052] RAX: ffffffffffffffda RBX: 00007fb7c90a5f60 RCX: 00007fb7c8f92b19 [ 3336.263561] RDX: 0000000020001780 RSI: 0000000040086602 RDI: 0000000000000003 [ 3336.264067] RBP: 00007fb7c8fecf6d R08: 0000000000000000 R09: 0000000000000000 [ 3336.264583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3336.265092] R13: 00007ffce590b1df R14: 00007fb7c6508300 R15: 0000000000022000 [ 3336.265615] [ 3336.270080] FAULT_INJECTION: forcing a failure. [ 3336.270080] name failslab, interval 1, probability 0, space 0, times 0 [ 3336.270955] CPU: 0 PID: 20922 Comm: syz-executor.4 Not tainted 6.2.0-rc1-next-20221226 #1 [ 3336.271568] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3336.272126] Call Trace: [ 3336.272314] [ 3336.272475] dump_stack_lvl+0x8f/0xb7 [ 3336.272774] should_fail_ex.cold+0x5/0xa [ 3336.273081] should_failslab+0x9/0x20 [ 3336.273366] __kmem_cache_alloc_node+0x5b/0x400 [ 3336.273709] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x290 [ 3336.274186] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x290 [ 3336.274680] __kmalloc+0x46/0xc0 [ 3336.274950] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x290 [ 3336.275446] ? genl_cmd_full_to_split+0x371/0x660 [ 3336.275832] genl_family_rcv_msg_doit.isra.0+0x9f/0x2e0 [ 3336.276252] ? __pfx_genl_family_rcv_msg_doit.isra.0+0x10/0x10 [ 3336.276712] ? cap_capable+0x1da/0x240 [ 3336.277028] ? security_capable+0x99/0xc0 [ 3336.277348] ? ns_capable+0xe1/0x100 [ 3336.277645] genl_rcv_msg+0x503/0x7e0 [ 3336.277956] ? __pfx_genl_rcv_msg+0x10/0x10 [ 3336.278296] ? perf_trace_lock_acquire+0xfd/0x530 [ 3336.278692] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 3336.279064] ? __pfx_nl80211_reload_regdb+0x10/0x10 [ 3336.279462] ? __pfx_nl80211_post_doit+0x10/0x10 [ 3336.279832] ? __pfx_perf_trace_lock_acquire+0x10/0x10 [ 3336.280232] netlink_rcv_skb+0x15d/0x450 [ 3336.280546] ? __pfx_genl_rcv_msg+0x10/0x10 [ 3336.280883] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 3336.281243] ? trace_lock_acquire+0x14c/0x1c0 [ 3336.281603] ? __pfx_down_read+0x10/0x10 [ 3336.281911] ? netlink_deliver_tap+0x1b2/0xc30 [ 3336.282270] ? is_vmalloc_addr+0x86/0xa0 [ 3336.282588] genl_rcv+0x28/0x40 [ 3336.282855] netlink_unicast+0x552/0x800 [ 3336.283177] ? __pfx_netlink_unicast+0x10/0x10 [ 3336.283544] ? __virt_addr_valid+0x102/0x340 [ 3336.283900] netlink_sendmsg+0x919/0xe10 [ 3336.284218] ? __pfx_netlink_sendmsg+0x10/0x10 [ 3336.284581] ? __pfx_netlink_sendmsg+0x10/0x10 [ 3336.284940] sock_sendmsg+0x158/0x190 [ 3336.285247] ____sys_sendmsg+0x744/0x930 [ 3336.285565] ? copy_msghdr_from_user+0xfc/0x150 [ 3336.285933] ? __pfx_____sys_sendmsg+0x10/0x10 [ 3336.286297] ? perf_trace_lock_acquire+0xfd/0x530 [ 3336.286674] ? __pfx_perf_trace_lock+0x10/0x10 [ 3336.287037] ___sys_sendmsg+0x110/0x1b0 [ 3336.287348] ? __pfx____sys_sendmsg+0x10/0x10 [ 3336.287702] ? rcu_read_lock_sched_held+0x11/0x80 [ 3336.288077] ? __fget_files+0x24e/0x450 [ 3336.288389] ? __pfx_lock_release+0x10/0x10 [ 3336.288716] ? trace_lock_acquire+0x14c/0x1c0 [ 3336.289059] ? __pfx___fget_files+0x10/0x10 [ 3336.289391] ? lock_acquire+0x32/0xc0 [ 3336.289697] ? __fget_files+0x270/0x450 [ 3336.290010] ? __fget_light+0xe5/0x280 [ 3336.290320] __sys_sendmsg+0xf7/0x1d0 [ 3336.290625] ? __pfx___sys_sendmsg+0x10/0x10 [ 3336.290976] ? perf_trace_preemptirq_template+0xa6/0x410 [ 3336.291407] ? perf_trace_preemptirq_template+0xa6/0x410 [ 3336.291826] ? perf_trace_preemptirq_template+0xa6/0x410 [ 3336.292248] ? ct_nmi_exit+0x11d/0x1c0 [ 3336.292559] ? syscall_enter_from_user_mode+0x21/0x50 [ 3336.292959] ? trace_hardirqs_on+0x31/0x130 [ 3336.293292] do_syscall_64+0x3f/0x90 [ 3336.293580] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3336.293978] RIP: 0033:0x7f04972fbb19 [ 3336.294253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3336.295594] RSP: 002b:00007f0494871188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3336.296178] RAX: ffffffffffffffda RBX: 00007f049740ef60 RCX: 00007f04972fbb19 [ 3336.296714] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 3336.297245] RBP: 00007f04948711d0 R08: 0000000000000000 R09: 0000000000000000 [ 3336.297769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3336.298300] R13: 00007ffe549767cf R14: 00007f0494871300 R15: 0000000000022000 [ 3336.298845] [ 3336.329142] EXT4-fs (loop6): invalid first ino: 4114797056 14:32:32 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) r4 = getpid() ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x40, 0x5, 0x81, 0xce, 0x0, 0xffffffff, 0x44021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x6, 0x1}, 0x880, 0x4, 0x5, 0x9, 0x2, 0x5, 0x8, 0x0, 0x5, 0x0, 0x3}, r4, 0xf, 0xffffffffffffffff, 0x8) socket$unix(0x1, 0x5, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0xa, 0x0, '\x00', [{0x0, 0x80, 0x1000, 0xcaf, 0x800, 0xa241}, {0x9, 0x9, 0x8e, 0xd07, 0x10001, 0x80000000}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) dup3(r3, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 3336.337457] loop6: detected capacity change from 0 to 4 [ 3336.339509] EXT4-fs (loop6): invalid first ino: 4114797056 14:32:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002180019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f0000000000000b00000000010000080000d242f5519ff9676f4ed68b49f1", 0x62, 0x400}], 0x0, &(0x7f0000014100)) 14:32:33 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0xfbffffff00000000) inotify_init1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @local}}) getpid() ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7, 0x0, 0x7}) ptrace$getsig(0x4202, 0x0, 0x1, &(0x7f0000000300)) socket$unix(0x1, 0x5, 0x0) waitid$P_PIDFD(0x3, r2, 0x0, 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 14:32:33 executing program 7: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002000600", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="040000000000000008000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB="72754702", @ANYRES32], 0x84, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8000, 0x94) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x1) pwrite64(r0, &(0x7f0000000780)="75c5d2f2aa03f05d254d5e1c670541bfe919ae6a6d92c416fc85b2f43b461d5c83e12a951001fcb3fc88dfa2494f68576a77bd0b08b9357d94bfb4108e4c3988c9927c9a4ff016", 0x47, 0x8) [ 3336.437660] loop6: detected capacity change from 0 to 4 14:32:33 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x535081, 0x0) r2 = inotify_init1(0x0) r3 = dup2(r2, r1) getpid() fallocate(0xffffffffffffffff, 0x3, 0x0, 0x3) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000140)=0x8) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, &(0x7f0000000200)={0x7}) socket$unix(0x1, 0x5, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r4, &(0x7f0000000780)=[{&(0x7f0000000340)="be", 0x1}], 0x1, 0x1ce0000, 0x0) fallocate(r4, 0x3, 0x0, 0x3) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x2}) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000040)=ANY=[]) symlinkat(&(0x7f0000000000)='./file0\x00', r5, 0x0) [ 3336.448877] EXT4-fs (loop6): invalid first ino: 4114797056 [ 3336.461468] tmpfs: Unknown parameter 'bond_slave_1' [ 3336.467026] loop6: detected capacity change from 0 to 4 [ 3336.481687] EXT4-fs (loop6): invalid first ino: 4114797056 14:32:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000) sigaltstack(&(0x7f0000ff7000/0x2000)=nil, 0x0) mincore(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x293f, &(0x7f0000000180)={0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000005, 0x40010, 0xffffffffffffffff, 0xf871a000) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x2f, 0x6, 0x35, 0x0, 0x0, 0x7ff, 0xa8a0, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x2e0b4, 0xfffffffffffffff7, 0xfffff27d, 0x1, 0x3, 0x8, 0x8000, 0x0, 0x1, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0xa) VM DIAGNOSIS: 14:32:33 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff824796f5 RDI=ffffffff87dc65e0 RBP=ffffffff87dc65a0 RSP=ffff88803a89efb8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000020 R11=0000000000000001 R12=0000000000000020 R13=ffffffff87dc65a0 R14=0000000000000010 R15=ffffffff824796e0 RIP=ffffffff8247974d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb7c6508700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe1e9d6c5000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe1e9d6c3000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f99c2169008 CR3=000000003388e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000ff00000000000000ff XMM01=6b6e696c6d7973006b6e696c6d797300 XMM02=0000000000ffff000000000000000000 XMM03=00007f750b1be7c800007f750b1be7c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff856d1624 RBX=ffffffff856d1620 RCX=ffffffff812c50a3 RDX=ffff7fffffffffff RSI=0000000000000004 RDI=ffffffff856d1620 RBP=ffffffff856d1620 RSP=ffff888033eb7970 R8 =0000000000000000 R9 =ffffffff856d1623 R10=0000000000000000 R11=0000000000000001 R12=0000000000000287 R13=ffff88800cf2eaf8 R14=ffff88801bc35a00 R15=ffff88800876cc80 RIP=ffffffff817ce9be RFL=00000016 [----AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe5253f11000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe5253f0f000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d621000 CR3=000000001bf78000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000