000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000498ff57baec4d66daa7d24f5d5ca47900d27e6bc72dd321647d2c8d3efff7204e5606270df044c2e7b1a1b0ea922c6f598a8d31b7e25"]) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:59:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x19f, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 601.800033] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 08:00:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)={@remote, 0x7b}) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000140)=0x5, 0x4) dup2(r0, r1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0xfffffffe, @empty}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000001c0)=ANY=[]) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000080)) 08:00:07 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:00:07 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:07 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0400653000"]) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000180)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f00000000c0)={'ipvlan1\x00'}) write$tun(r1, &(0x7f0000000100)={@void, @val, @ipv6=@udp={0x0, 0x6, "85bebd", 0x253, 0x11, 0x0, @private1, @ipv4={'\x00', '\xff\xff', @loopback}, {[@hopopts={0x0, 0x14, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x0, 0x86, "69294dd71a74924bda1dbcd7bfad719f2315bb35e236500d3577437f3da4c9317838df0ae9c2f8ce17436b30e01d0b1616ba7a1d49b206707c6d7e096a58a8a9746359f7b1ef274bb70d728a834b954f0836cb1c0304f3398c201a8af3fde54ecb262318902db96104f9a87e0446e37491c633b7802119bfe7ebb5d1ee78b2cd1f9ae0f364d2"}, @hao={0xc9, 0x10, @local}]}, @srh={0x0, 0xc, 0x4, 0x6, 0x0, 0x0, 0x0, [@local, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2]}, @fragment, @dstopts={0x0, 0xb, '\x00', [@generic={0x0, 0x57, "87976471caa85070e77e48d46badb7869984132d4895315f9d4dbeb519543875607f2a2abc6e278774f18a030c5a9393f975aa11bad72280c890ab0e864b88d4877244777e0a7f97826fc75df0aecd73ddf914dfb1f8ee"}]}], {0x0, 0x0, 0xcb, 0x0, @opaque="ab25f64d80629f4781205d2ca523d702dcc65698f28a131b37766e86a9326e43fccbdca24ff1585d6d100ec57209c9bed7a4db72368a9f164a373571e47f3f0bb2b98ffc6f0a12ff8a64490afd7c0426d300cff9c244341b0ce0ea298c8ecf9065c34eaa2f50b270ab6a4ab5075faf2b62701ac87163abaa9b3383b2008e83f76932ac65f26612f68dd7d31c3bbc15a576f0867dbc3371508c2f2f2936c62d651fde1f3fcab18e8d98fd76382dfef7502be25f28606ac97b2e4c39707104ac97f5fce6"}}}}, 0x285) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000080)=""/180, 0xb4}, {&(0x7f0000000200)=""/202, 0xca}], 0x2) 08:00:07 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:00:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x19f, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:00:07 executing program 6: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001580)={&(0x7f0000001780)=ANY=[@ANYBLOB="20000000b515eeacf7f8326271067343eee840468b07bb93caea096ba19e824af6c5ba1921bc2cfb2d41d55472bd3ec39cbc4edc37a544630ed84e0b53d4ea24ef73361091ce72f2c7937d103c75a609af539e95d2799c989f6edeac978f1a17a02f0b66075b08f9a02d12281d612b155a3ec6a7", @ANYRES16=0x0, @ANYBLOB="08000000001400"], 0x20}, 0x1, 0x0, 0x0, 0x20004004}, 0x4000008) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="db5731ffbf1b6fef3a00000008000100", @ANYRES32=0x0, @ANYBLOB="3439e946100000000000000000"], 0x28}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000001300)=""/119, 0x77}, {&(0x7f0000001380)=""/178, 0xb2}, {&(0x7f0000001440)=""/201, 0xc9}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x4, 0xfc, 0x10001) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r2) syz_io_uring_setup(0x6866, &(0x7f0000001600)={0x0, 0xcf06, 0x2, 0x0, 0x43}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001740), &(0x7f00000016c0)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000001700)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1}, 0xab) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='syscall\x00') preadv(r5, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000180)=0x8001, 0x4) add_key(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r3) syz_open_procfs(0xffffffffffffffff, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x1c7a02, 0x0) unshare(0x48020200) 08:00:07 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 615.197611] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 615.228882] isofs_fill_super: get root inode failed [ 615.247809] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 615.248056] SELinux: Context system_u:object_r:iptables_unit_file_t:s0 is not valid (left unmapped). [ 615.250393] kauditd_printk_skb: 50 callbacks suppressed [ 615.250412] audit: type=1400 audit(1715068807.641:111): avc: denied { associate } for pid=9806 comm="syz-executor.7" name="cgroup.procs" dev="cgroup2" ino=1434 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:iptables_unit_file_t:s0" 08:00:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:00:07 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:00:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)={@remote, 0x7b}) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000140)=0x5, 0x4) dup2(r0, r1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0xfffffffe, @empty}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000001c0)=ANY=[]) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000080)) [ 615.345782] isofs_fill_super: get root inode failed [ 615.384543] isofs_fill_super: get root inode failed 08:00:07 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {0x0, 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:00:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r3, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r4}}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:00:07 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:00:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:00:07 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x4008844}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000480)=0x10001, 0x4) pipe2(&(0x7f00000000c0)={0x0, 0x0}, 0x800) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f00000015c0)=',', 0xa302}], 0x10000000000002a3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)={0x3, 'veth0_vlan\x00', {0xb2}}) sendmmsg$inet(r2, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0xb6}]}}}], 0x18}}], 0x1, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') 08:00:07 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:07 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {0x0, 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 615.626139] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:00:08 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {0x0, 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 615.647156] isofs_fill_super: get root inode failed [ 615.652753] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:00:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r3, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r4}}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:00:08 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 615.744605] isofs_fill_super: get root inode failed [ 615.819224] isofs_fill_super: get root inode failed [ 625.991830] Bluetooth: hci6: command 0x0406 tx timeout [ 630.311487] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:00:22 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:00:22 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:00:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000002500100027bd7000ffdbdf25ff7f00001ba5d6222a9675ab2c7839a21fb7fe2ef558b245f88b5b6f805bbd5421730a563cb105c6db1c8b5e84550432d5941919ff98ce8181fce23574a8d3b32a81ec1dcf0830b4e5eb59132f127eabe874c12b96d09d992e08dc84e626c8b53046b16911e3a6ffb2c2bc261c55bb1809526718563a3fbf99631d46cb0c086b0a3465a687b89e80bab6e540c32c819189c3c3e56b4a4c0632a6ecb44a6d4cc98398b9fd4c6fc03af494e379e6e11694e19912de0a7556d9781c4ceaa68e50394000cab75cfe808781772b0da64f9cde893c5f84fb008d45dd1af36c0a8ddb1ad76b9fc897f18813832ad53410d88a990941c78e38909aac72db"], 0x14}, 0x1, 0x0, 0x0, 0x4008844}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000480)=0x10001, 0x4) pipe2(&(0x7f00000000c0)={0x0, 0x0}, 0x800) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f00000015c0)=',', 0xa302}], 0x10000000000002a3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)={0x3, 'veth0_vlan\x00', {0xb2}}) sendmmsg$inet(r2, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0xb6}]}}}], 0x18}}], 0x1, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') 08:00:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:00:22 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:22 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:22 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r3, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r4}}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:00:22 executing program 6: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001580)={&(0x7f0000001780)=ANY=[@ANYBLOB="20000000b515eeacf7f8326271067343eee840468b07bb93caea096ba19e824af6c5ba1921bc2cfb2d41d55472bd3ec39cbc4edc37a544630ed84e0b53d4ea24ef73361091ce72f2c7937d103c75a609af539e95d2799c989f6edeac978f1a17a02f0b66075b08f9a02d12281d612b155a3ec6a7", @ANYRES16=0x0, @ANYBLOB="08000000001400"], 0x20}, 0x1, 0x0, 0x0, 0x20004004}, 0x4000008) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="db5731ffbf1b6fef3a00000008000100", @ANYRES32=0x0, @ANYBLOB="3439e946100000000000000000"], 0x28}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000001300)=""/119, 0x77}, {&(0x7f0000001380)=""/178, 0xb2}, {&(0x7f0000001440)=""/201, 0xc9}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x4, 0xfc, 0x10001) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r2) syz_io_uring_setup(0x6866, &(0x7f0000001600)={0x0, 0xcf06, 0x2, 0x0, 0x43}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001740), &(0x7f00000016c0)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000001700)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1}, 0xab) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='syscall\x00') preadv(r5, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000180)=0x8001, 0x4) add_key(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r3) syz_open_procfs(0xffffffffffffffff, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x1c7a02, 0x0) unshare(0x48020200) [ 630.505986] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 630.521492] isofs_fill_super: get root inode failed [ 630.634285] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:00:23 executing program 2: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001580)={&(0x7f0000001780)=ANY=[@ANYBLOB="20000000b515eeacf7f8326271067343eee840468b07bb93caea096ba19e824af6c5ba1921bc2cfb2d41d55472bd3ec39cbc4edc37a544630ed84e0b53d4ea24ef73361091ce72f2c7937d103c75a609af539e95d2799c989f6edeac978f1a17a02f0b66075b08f9a02d12281d612b155a3ec6a7", @ANYRES16=0x0, @ANYBLOB="08000000001400"], 0x20}, 0x1, 0x0, 0x0, 0x20004004}, 0x4000008) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="db5731ffbf1b6fef3a00000008000100", @ANYRES32=0x0, @ANYBLOB="3439e946100000000000000000"], 0x28}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000001300)=""/119, 0x77}, {&(0x7f0000001380)=""/178, 0xb2}, {&(0x7f0000001440)=""/201, 0xc9}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x4, 0xfc, 0x10001) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r2) syz_io_uring_setup(0x6866, &(0x7f0000001600)={0x0, 0xcf06, 0x2, 0x0, 0x43}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000001740), &(0x7f00000016c0)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000001700)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1}, 0xab) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='syscall\x00') preadv(r5, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000180)=0x8001, 0x4) add_key(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r3) syz_open_procfs(0xffffffffffffffff, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x1c7a02, 0x0) unshare(0x48020200) 08:00:23 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:00:23 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:00:23 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 630.863474] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 630.909219] isofs_fill_super: get root inode failed 08:00:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:00:23 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:23 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 631.210064] isofs_fill_super: get root inode failed [ 631.234030] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:00:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r3, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r4}}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:00:23 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:37 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r3, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r4}}, 0x7) 08:00:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:00:37 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:37 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:00:37 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d020000000000000200"/208, 0xd0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:00:37 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:37 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_destroy(r0) [ 645.372128] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:00:37 executing program 6: ftruncate(0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) syz_open_procfs(r1, &(0x7f00000002c0)='fdinfo/4\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000001f210c000000000000000002000000"], 0x14}}, 0x0) fcntl$dupfd(r3, 0x406, r0) r4 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x10000, 0x0, 0x0, 0x176}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)=0x0) r6 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000140)=r6, 0x1) syz_io_uring_submit(0x0, r5, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL, 0x0) io_uring_enter(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) mq_timedsend(r7, 0x0, 0xff7f, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000010000001800038f", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fcntl$setstatus(r2, 0x4, 0x6400) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000100)={0x1, 0x0, 0x3}) write(r2, &(0x7f0000001200), 0xffffff45) [ 645.384226] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 645.463869] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:00:37 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 645.610211] isofs_fill_super: get root inode failed 08:00:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:00:53 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:53 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:53 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:00:53 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:00:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r3, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r4}}, 0x7) 08:00:53 executing program 6: ftruncate(0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) syz_open_procfs(r1, &(0x7f00000002c0)='fdinfo/4\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000001f210c000000000000000002000000"], 0x14}}, 0x0) fcntl$dupfd(r3, 0x406, r0) r4 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x10000, 0x0, 0x0, 0x176}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)=0x0) r6 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000140)=r6, 0x1) syz_io_uring_submit(0x0, r5, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL, 0x0) io_uring_enter(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) mq_timedsend(r7, 0x0, 0xff7f, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000010000001800038f", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fcntl$setstatus(r2, 0x4, 0x6400) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000100)={0x1, 0x0, 0x3}) write(r2, &(0x7f0000001200), 0xffffff45) 08:00:53 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 660.713984] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 660.725823] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 660.746599] isofs_fill_super: get root inode failed [ 660.786472] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:00:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:00:53 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:00:53 executing program 6: ftruncate(0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) syz_open_procfs(r1, &(0x7f00000002c0)='fdinfo/4\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000001f210c000000000000000002000000"], 0x14}}, 0x0) fcntl$dupfd(r3, 0x406, r0) r4 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x10000, 0x0, 0x0, 0x176}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)=0x0) r6 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000140)=r6, 0x1) syz_io_uring_submit(0x0, r5, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL, 0x0) io_uring_enter(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) mq_timedsend(r7, 0x0, 0xff7f, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000010000001800038f", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fcntl$setstatus(r2, 0x4, 0x6400) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000100)={0x1, 0x0, 0x3}) write(r2, &(0x7f0000001200), 0xffffff45) 08:00:53 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:00:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r3, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r4}}, 0x7) 08:00:54 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:00:54 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 661.705838] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 661.711727] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 661.780497] isofs_fill_super: get root inode failed 08:00:54 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 661.809580] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:00:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:00:54 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a08780914", 0x68, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 661.930588] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:00:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 662.060400] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:01:07 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:07 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:07 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:01:07 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a08780914", 0x68, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:01:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:01:07 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:01:07 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) [ 675.485347] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 675.507031] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 675.565051] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 675.583839] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:01:08 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a08780914", 0x68, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:01:08 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:08 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:08 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:01:08 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 675.805235] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 675.816929] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:01:08 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:01:08 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809", 0x9c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:01:08 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:08 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 676.006923] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:01:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:01:08 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809", 0x9c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:01:08 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 676.046408] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 676.056973] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:01:08 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:08 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a08780914", 0x68, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 676.174081] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:01:23 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a08780914", 0x68, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:01:23 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:01:23 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:23 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:01:23 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:23 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:01:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) [ 691.213330] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 691.245881] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 691.283553] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 691.292180] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:01:23 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a08780914", 0x68, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:01:23 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:23 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 692.022743] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:01:43 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:43 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:43 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:01:43 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:43 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:01:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:01:43 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:43 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) [ 711.537397] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 711.539919] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 711.549279] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 711.602984] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:01:44 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a08780914", 0x68, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:01:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:01:44 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:01:44 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:01:44 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 711.886720] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 711.942604] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:01:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:02:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:02:02 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a08780914", 0x68, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:02:02 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:02:02 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:02 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:02 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:02 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1}, 0x3) 08:02:02 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 730.292379] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 730.298761] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 730.387404] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:02:02 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a08780914", 0x68, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 730.454708] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:02:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:02:03 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:03 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:03 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 731.311844] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:02:03 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1}, 0x3) 08:02:03 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c012000000000", 0x75, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 731.380115] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:02:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 731.510618] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 731.590451] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:02:21 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d7192", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:21 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c012000000000", 0x75, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:02:21 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1}, 0x3) 08:02:21 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:02:21 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:02:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:02:21 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 749.150408] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:02:21 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 749.226807] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 749.236270] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:02:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:02:21 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c012000000000", 0x75, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:02:21 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d7192", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:22 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:02:22 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:02:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:02:23 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:23 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000", 0x7c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 750.749813] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 750.752347] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:02:23 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 751.773717] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:02:41 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:41 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000", 0x55, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:02:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:02:41 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d7192", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 769.276052] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:02:41 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:02:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000", 0x7c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:02:41 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 769.348723] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:02:42 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:42 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc3351", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 770.257282] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:02:42 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000", 0x7c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:02:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000", 0x55, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 770.328686] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:02:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) [ 770.515811] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:02:42 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000000000", 0x7f, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:02:42 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:02:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000", 0x55, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:02:43 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc3351", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 770.822840] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:03:01 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:01 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:01 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000000000", 0x7f, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:01 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:01 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:03:01 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc3351", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:01 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029", 0x58, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 788.788284] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 788.829265] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 788.874137] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 788.904236] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:03:01 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:01 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000000000", 0x7f, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029", 0x58, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 789.739239] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:03:19 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:19 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:19 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:19 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029", 0x58, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:19 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:03:19 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:19 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 806.745529] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 806.814883] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 806.816643] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 806.838777] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:03:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000290000000000002925", 0x59, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:19 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:19 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:19 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc335111aa99e79b84038a8b62eb60cca47dc6dd1b70f2ba6802ca7e1bca603fe44dd2b6cbd4b371", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:20 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000290000000000002925", 0x59, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 807.880071] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:03:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) [ 808.766867] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:03:38 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:03:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000290000000000002925", 0x59, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:38 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:38 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:38 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:38 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:38 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 826.650766] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 826.722591] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 [ 826.878132] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 826.931279] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:03:39 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:39 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:39 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:39 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) [ 827.253944] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:03:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 827.354421] isofs_fill_super: bread failed, dev=loop5, iso_blknum=56, block=112 08:03:39 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 827.433385] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:03:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:39 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 827.584014] isofs_fill_super: get root inode failed 08:03:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:40 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 827.791343] isofs_fill_super: get root inode failed 08:03:40 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:40 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:40 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:40 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:40 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:40 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 827.966946] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 827.967820] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 828.063870] isofs_fill_super: get root inode failed 08:03:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:40 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:58 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:58 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:03:58 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:58 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:58 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:03:58 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:58 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 845.954917] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 846.015374] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 846.028893] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:03:58 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:58 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:58 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 846.599806] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 846.686541] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:03:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:03:59 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:03:59 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:03:59 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) [ 846.939265] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 846.942889] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:04:16 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:04:16 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:04:16 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:04:16 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:04:16 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc335111aa99e79b84038a8b62eb60cca47dc6dd1b70f2ba6802ca7e1bca603fe44dd2b6cbd4b37170f500042d3479074e7f1366c073a4cf9c5b1532174767cb0b077944", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:04:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:04:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:04:16 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 864.513542] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 864.520530] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:04:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 864.591451] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:04:17 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:04:17 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:04:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 865.273889] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:04:17 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:04:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:04:17 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:04:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 865.445928] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 865.517530] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 865.613584] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 882.767700] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:04:35 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:04:35 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:04:35 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:04:35 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:04:35 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:04:35 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:04:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:04:35 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 882.827345] ISOFS: Logical zone size(0) < hardware blocksize(1024) 08:04:35 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 883.374780] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 883.562286] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 883.634755] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:04:53 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:04:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:04:53 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:04:53 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:04:53 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:04:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:04:53 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:04:53 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 900.731626] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 900.765524] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 900.822877] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 900.838489] ISOFS: Logical zone size(0) < hardware blocksize(1024) 08:04:53 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:10 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:10 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:05:10 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:10 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:05:10 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:05:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:05:10 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 918.336851] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 918.337860] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 918.351261] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 918.353261] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:05:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:05:10 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:05:11 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc335111aa99e79b84038a8b62eb60cca47dc6dd1b70f2ba6802ca7e1bca603fe44dd2b6cbd4b37170f500042d3479074e7f1366c073a4cf9c5b1532174767cb0b0779444cd1f1aace61b5", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:11 executing program 4: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:05:11 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:11 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:11 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 919.600292] ISOFS: Logical zone size(0) < hardware blocksize(1024) 08:05:12 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) [ 919.648482] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 919.669355] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:05:12 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 919.756689] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:05:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:05:12 executing program 4: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:05:12 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:12 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 920.324085] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 920.853616] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 920.875614] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:05:30 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:05:30 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:30 executing program 4: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:05:30 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:30 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:30 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:05:30 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:05:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 937.689766] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 937.689815] isofs_fill_super: get root inode failed [ 937.731398] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 937.743553] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 937.744171] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:05:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:05:30 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:30 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:05:30 executing program 4: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 937.966804] isofs_fill_super: get root inode failed [ 937.977622] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 937.980617] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:05:30 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:30 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:05:30 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:05:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 938.100502] isofs_fill_super: get root inode failed [ 938.112970] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:05:47 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:47 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:47 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:47 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:05:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000029000000000000290000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:05:47 executing program 4: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:05:47 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:05:47 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:05:47 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 955.429329] isofs_fill_super: get root inode failed [ 955.455719] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 955.491191] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:05:48 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000029000000000000290000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:05:48 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x0, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:48 executing program 4: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:05:48 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:48 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) [ 956.492765] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:05:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 956.511239] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:05:48 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:05:48 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000029000000000000290000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:05:49 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:49 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:05:49 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 956.717040] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:05:49 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 956.821473] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 957.082799] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 957.084894] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 957.085499] isofs_fill_super: get root inode failed 08:06:06 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:06 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) [ 974.548723] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 974.556089] isofs_fill_super: get root inode failed [ 974.560738] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 974.585978] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 974.606589] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:06:06 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:06:06 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000", 0x55, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:06:06 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:06 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:06 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:07 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:06:07 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:07 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000", 0x55, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:06:07 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:07 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:07 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 975.007693] isofs_fill_super: get root inode failed [ 975.036967] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 975.106646] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 975.107312] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:06:07 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 975.210843] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:06:07 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:07 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 975.424389] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:06:24 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:24 executing program 6: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:06:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:06:24 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:24 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:24 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000", 0x55, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:06:24 executing program 1: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 992.444706] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 992.506214] isofs_fill_super: get root inode failed [ 992.513582] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 992.531462] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 992.546769] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:06:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:06:24 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc335111aa99e79b84038a8b62eb60cca47dc6dd1b70f2ba6802ca7e1bca603fe44dd2b6cbd4b37170f500042d3479074e7f1366c073a4cf9c5b1532174767cb0b0779444cd1f1aace61b5ed70", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:24 executing program 6: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:25 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029", 0x58, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 992.668850] isofs_fill_super: get root inode failed 08:06:25 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 992.832650] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 992.866349] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:06:42 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:42 executing program 2: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:06:42 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029", 0x58, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:06:42 executing program 1: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:06:42 executing program 6: mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r0}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:42 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1009.920472] isofs_fill_super: get root inode failed [ 1009.922993] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1009.946655] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1009.952115] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1009.954068] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:06:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:06:42 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:42 executing program 2: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:42 executing program 6: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 1010.162120] isofs_fill_super: get root inode failed [ 1010.202023] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:06:59 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029", 0x58, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:06:59 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:59 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:06:59 executing program 6: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:06:59 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:59 executing program 2: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:06:59 executing program 1: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:59 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1027.421664] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1027.430322] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 1027.436805] isofs_fill_super: get root inode failed 08:06:59 executing program 2: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1027.493519] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1027.494281] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:06:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:06:59 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:06:59 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000290000000000002925", 0x59, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:06:59 executing program 6: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 1027.683285] isofs_fill_super: get root inode failed [ 1027.708849] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1027.718929] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:07:17 executing program 2: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:17 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:07:17 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000290000000000002925", 0x59, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:07:17 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:17 executing program 6: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:07:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:07:17 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:07:17 executing program 2: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1044.951242] isofs_fill_super: get root inode failed [ 1044.951860] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1044.952510] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1044.971178] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1044.975874] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:07:17 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:07:34 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:34 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:07:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) 08:07:34 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:34 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:34 executing program 6: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:07:34 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000290000000000002925", 0x59, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:07:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 1062.214315] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:07:34 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1062.254213] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1062.262808] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 1062.288926] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:07:34 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:34 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:34 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:34 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:34 executing program 6: r0 = syz_io_uring_setup(0x6c6b, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:07:34 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:07:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 1062.633378] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:07:35 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1062.827855] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:07:51 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:51 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:07:51 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:07:51 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:51 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:07:51 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:07:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) [ 1079.577087] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 08:07:51 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:52 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1079.658564] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1079.665927] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1079.668598] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:07:52 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:07:52 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:07:52 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:52 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:07:52 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:07:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') [ 1080.005749] isofs_fill_super: bread failed, dev=loop0, iso_blknum=64, block=128 [ 1080.100713] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1080.196832] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:08:09 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:09 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:08:09 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:09 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:09 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(0x0, r0, &(0x7f0000000080)='./file0\x00') 08:08:09 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:08:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r3}}, 0x3) [ 1097.348030] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1097.366720] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1097.396128] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:08:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(0x0, r0, &(0x7f0000000080)='./file0\x00') 08:08:09 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:09 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:09 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:08:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(0x0, r0, &(0x7f0000000080)='./file0\x00') 08:08:09 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc335111aa99e79b84038a8b62eb60cca47dc6dd1b70f2ba6802ca7e1bca603fe44dd2b6cbd4b37170f500042d3479074e7f1366c073a4cf9c5b1532174767cb0b0779444cd1f1aace61b5ed70", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, 0x0, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1097.585617] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1097.714645] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:08:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:08:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 08:08:27 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:08:27 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:27 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:08:27 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:27 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:27 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc335111aa99e79b84038a8b62eb60cca47dc6dd1b70f2ba6802ca7e1bca603fe44dd2b6cbd4b37170f500042d3479074e7f1366c073a4cf9c5b1532174767cb0b0779444cd1f1aace61b5ed70", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, 0x0, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:27 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) [ 1115.371520] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1115.425190] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 08:08:27 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, 0x0, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1115.520684] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:08:27 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 08:08:28 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r2}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:08:28 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c00210000000000002164000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a080074001d0000000000001d00080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') [ 1115.980137] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:08:28 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:08:28 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, 0x0) 08:08:45 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:08:45 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:08:45 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:45 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:45 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc335111aa99e79b84038a8b62eb60cca47dc6dd1b70f2ba6802ca7e1bca603fe44dd2b6cbd4b37170f500042d3479074e7f1366c073a4cf9c5b1532174767cb0b0779444cd1f1aace61b5ed70", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:45 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:45 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) [ 1133.238467] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1133.262272] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1133.265313] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 08:08:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, 0x0) 08:08:45 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}, {0x0}], 0x0, &(0x7f0000012200)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, 0x0) 08:08:46 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc335111aa99e79b84038a8b62eb60cca47dc6dd1b70f2ba6802ca7e1bca603fe44dd2b6cbd4b37170f500042d3479074e7f1366c073a4cf9c5b1532174767cb0b0779444cd1f1aace61b5ed70", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:46 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:08:46 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) [ 1134.013791] ISOFS: Logical zone size(0) < hardware blocksize(1024) 08:08:46 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000000000000000000000ff0200000000000000000000ffff000000000000000000000a00403c0000000078637f00000000000000d0b1e09ece2edf8be3afc1959d20009f1ce06120723f1ff6c65b0f07dce11d6e9896c57a71da80777802125c2632a4f4e67e6b48cb734bc482b46ba4b078b63c0ca1b0241a741da46d719293ed62afd0f4cc8113610414b60f101544ff7fc2f5def3186b8a7a6a0f51bc160439043f891c2ac3c1558b807261035c15329068f5b00200f8f74fa8cffdba9d7b7a84be449ea8bdbc335111aa99e79b84038a8b62eb60cca47dc6dd1b70f2ba6802ca7e1bca603fe44dd2b6cbd4b37170f500042d3479074e7f1366c073a4cf9c5b1532174767cb0b0779444cd1f1aace61b5ed70", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:46 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:46 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) [ 1134.240524] ISOFS: Logical zone size(0) < hardware blocksize(1024) 08:08:46 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:08:46 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:46 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:08:46 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000005c0)) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:08:46 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:08:46 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short}, 0x80, &(0x7f00000017c0)}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1134.393561] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1134.412572] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1134.916424] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 1134.967147] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:09:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:09:04 executing program 4: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000005c0)) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:09:04 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short}, 0x80, 0x0}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:09:04 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r4}}, 0x3) 08:09:04 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) 08:09:04 executing program 6: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, 0x0, 0x16) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x10001, 0x28) 08:09:04 executing program 1: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:09:04 executing program 2: r0 = syz_io_uring_setup(0x6c6b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000280)=[{&(0x7f0000000340)="bf945cf9e958767d4cc2ae760d7364c2fe4c4e291930c46bd8927b08da2b609a96a63356eec81040df56633fb6c6d1a879665126257a397b5593bdaeea681ce6769ff805471ae3e5b35952f44fe9ac75c708336bdde7084e512a06b023016c67541f9633116647df279a740c5a52be7e3dc082fd842b0acabc1ef66b86570e", 0x7f, 0x90}, {&(0x7f00000003c0)="8445a95e118d5488bf382003f7050394870bb9c94a42adcad07fb40d1dee437595c679093e55a1ebb761e6fce21d5aea09779e19de0d2be700c55ab6ac982fdfe4f705da2b640a0d9a130f5d06bd49dbd8dff5f8dd0ad0ec2ed489c7edba4de3574dbdd585ea652c969a46f1efaa7887d21590071add0d32baf67485076c7fad04ad72fb061766ff4d3b7068c45d753a4d7b577f67df04cb99761ade51c07838210c4ca3927cb594c39e6cade0e4284ecd36b8b6bed240052cb3b91bc9027bb2a081a2bcafc9862414980a393437a429184d4dd18c50744929258904180e3479001fdc8caf95ffbb", 0xe8, 0x100}], 0xc0, &(0x7f0000000600)={[{@grpid}], [{@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type}, {@uid_lt={'uid<', r3}}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index}, 0x7) bind(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x306, @remote}, 0x80) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1152.158417] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 1152.199942] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1152.202813] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1188.473835] watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.4:11602] [ 1188.474623] Modules linked in: [ 1188.474922] irq event stamp: 4952127 [ 1188.475276] hardirqs last enabled at (4952126): [] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1188.476182] hardirqs last disabled at (4952127): [] sysvec_apic_timer_interrupt+0xb/0xa0 [ 1188.477044] softirqs last enabled at (4926140): [] asm_call_irq_on_stack+0x12/0x20 [ 1188.477869] softirqs last disabled at (4926143): [] asm_call_irq_on_stack+0x12/0x20 [ 1188.478817] CPU: 0 PID: 11602 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 1188.479435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1188.480195] RIP: 0010:unwind_next_frame+0x1cb/0x1a90 [ 1188.480672] Code: 4d 85 ff 0f 84 48 01 00 00 49 81 ff 00 00 00 81 0f 82 57 04 00 00 49 81 ff 82 40 20 84 0f 83 4a 04 00 00 44 8b 15 85 6a b8 03 <4c> 89 fe 48 81 ee 00 00 00 81 48 c1 ee 08 41 8d 52 ff 39 d6 0f 83 [ 1188.482332] RSP: 0018:ffff88806ce09648 EFLAGS: 00000287 [ 1188.482879] RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffffffff84eb8ce0 [ 1188.483536] RDX: dffffc0000000000 RSI: ffffffff8400011f RDI: ffff88806ce09720 [ 1188.484191] RBP: ffff88806ce09755 R08: 0000000000000001 R09: 0000000000000001 [ 1188.484885] R10: 0000000000032042 R11: 1ffff1100d9c12d1 R12: ffff88806ce09768 [ 1188.485554] R13: ffff88806ce09720 R14: 1ffff1100d9c12d1 R15: ffffffff8400011e [ 1188.486217] FS: 00007fb2f253b700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1188.487178] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1188.487718] CR2: 00007fb7852cf42d CR3: 000000004aac6000 CR4: 0000000000350ef0 [ 1188.488373] Call Trace: [ 1188.488618] [ 1188.488840] ? watchdog_timer_fn+0x33d/0x400 [ 1188.489253] ? lockup_detector_update_enable+0x90/0x90 [ 1188.489760] ? __hrtimer_run_queues+0x1ca/0xb40 [ 1188.490214] ? enqueue_hrtimer+0x2e0/0x2e0 [ 1188.490637] ? ktime_get_update_offsets_now+0x25c/0x360 [ 1188.491152] ? hrtimer_interrupt+0x2fd/0x9b0 [ 1188.491587] ? mark_held_locks+0x9e/0xe0 [ 1188.491980] ? __sysvec_apic_timer_interrupt+0xfb/0x310 [ 1188.492484] ? sysvec_apic_timer_interrupt+0x3e/0xa0 [ 1188.492965] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1188.493474] ? entry_SYSCALL_64_after_hwframe+0x66/0xcc [ 1188.493986] ? entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1188.494896] ? unwind_next_frame+0x1cb/0x1a90 [ 1188.495902] ? unwind_next_frame+0x1289/0x1a90 [ 1188.497099] ? entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1188.498528] ? deref_stack_reg+0x160/0x160 [ 1188.499642] ? __unwind_start+0x523/0x7e0 [ 1188.500735] ? create_prof_cpu_mask+0x20/0x20 [ 1188.501916] arch_stack_walk+0x83/0xf0 [ 1188.503001] ? entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1188.504417] ? kmem_cache_free+0xa7/0x2d0 [ 1188.505579] stack_trace_save+0x8c/0xc0 [ 1188.506675] ? stack_trace_consume_entry+0x160/0x160 [ 1188.508012] ? lock_chain_count+0x20/0x20 [ 1188.511147] ? ktime_get+0x158/0x1f0 [ 1188.511894] kasan_save_stack+0x1b/0x40 [ 1188.512695] ? kasan_save_stack+0x1b/0x40 [ 1188.513564] ? kasan_set_track+0x1c/0x30 [ 1188.514405] ? kasan_set_free_info+0x1b/0x30 [ 1188.514983] ? __kasan_slab_free+0x110/0x160 [ 1188.515583] ? slab_free_freelist_hook+0xa9/0x180 [ 1188.516109] ? kmem_cache_free+0xa7/0x2d0 [ 1188.516565] ? kfree_skbmem+0xef/0x1b0 [ 1188.516990] ? kfree_skb+0x122/0x2c0 [ 1188.517396] ? __dev_kfree_skb_any+0x95/0xa0 [ 1188.517866] ? mac80211_hwsim_tx_frame_nl+0xa46/0xc10 [ 1188.518422] ? mac80211_hwsim_tx_frame+0x110/0x1e0 [ 1188.518958] ? mac80211_hwsim_beacon_tx+0x494/0x940 [ 1188.519502] ? __iterate_interfaces+0x1f0/0x550 [ 1188.520009] ? ieee80211_iterate_active_interfaces_atomic+0x71/0x1c0 [ 1188.520650] ? mac80211_hwsim_beacon+0xd1/0x1d0 [ 1188.521220] ? __hrtimer_run_queues+0x632/0xb40 [ 1188.521789] ? hrtimer_run_softirq+0x148/0x310 [ 1188.522218] ? __do_softirq+0x1b8/0x7c9 [ 1188.523053] ? asm_call_irq_on_stack+0x12/0x20 [ 1188.524257] ? do_softirq_own_stack+0x80/0xa0 [ 1188.524796] ? irq_exit_rcu+0x114/0x1b0 [ 1188.525262] ? sysvec_apic_timer_interrupt+0x43/0xa0 [ 1188.525850] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1188.526388] ? refill_obj_stock+0x18c/0x320 [ 1188.526807] ? ___cache_free+0x101/0x360 [ 1188.527182] ? qlist_free_all+0x59/0xe0 [ 1188.527555] ? quarantine_reduce+0x184/0x210 [ 1188.527966] ? __kasan_kmalloc.constprop.0+0xa2/0xd0 [ 1188.528435] ? kmem_cache_alloc_bulk+0x147/0x320 [ 1188.528864] ? io_submit_sqes+0x6f76/0x85c0 [ 1188.529266] ? __do_sys_io_uring_enter+0x6b5/0x18c0 [ 1188.529731] ? do_syscall_64+0x33/0x40 [ 1188.530101] ? entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1188.530799] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1188.531425] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1188.531997] ? trace_hardirqs_on+0x5b/0x180 [ 1188.532523] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1188.533122] ? mark_held_locks+0x9e/0xe0 [ 1188.533624] kasan_set_track+0x1c/0x30 [ 1188.534057] kasan_set_free_info+0x1b/0x30 [ 1188.534585] __kasan_slab_free+0x110/0x160 [ 1188.535056] slab_free_freelist_hook+0xa9/0x180 [ 1188.535683] ? kfree_skbmem+0xef/0x1b0 [ 1188.536120] kmem_cache_free+0xa7/0x2d0 [ 1188.536610] ? hwsim_unicast_netgroup+0x476/0x640 [ 1188.537133] ? __dev_kfree_skb_any+0x95/0xa0 [ 1188.537671] kfree_skbmem+0xef/0x1b0 [ 1188.538084] ? __dev_kfree_skb_any+0x95/0xa0 [ 1188.538595] kfree_skb+0x122/0x2c0 [ 1188.538927] __dev_kfree_skb_any+0x95/0xa0 [ 1188.539435] mac80211_hwsim_tx_frame_nl+0xa46/0xc10 [ 1188.539911] ? hwsim_unicast_netgroup+0x640/0x640 [ 1188.540419] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1188.540939] ? mac80211_hwsim_monitor_rx+0x1b8/0x810 [ 1188.541470] mac80211_hwsim_tx_frame+0x110/0x1e0 [ 1188.541921] mac80211_hwsim_beacon_tx+0x494/0x940 [ 1188.542434] __iterate_interfaces+0x1f0/0x550 [ 1188.542869] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 1188.543437] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 1188.543901] ieee80211_iterate_active_interfaces_atomic+0x71/0x1c0 [ 1188.544542] mac80211_hwsim_beacon+0xd1/0x1d0 [ 1188.545044] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x13d0/0x13d0 [ 1188.545735] __hrtimer_run_queues+0x632/0xb40 [ 1188.546235] ? enqueue_hrtimer+0x2e0/0x2e0 [ 1188.546749] ? ktime_get_update_offsets_now+0x25c/0x360 [ 1188.547423] hrtimer_run_softirq+0x148/0x310 [ 1188.547892] __do_softirq+0x1b8/0x7c9 [ 1188.548370] asm_call_irq_on_stack+0x12/0x20 [ 1188.548825] [ 1188.549088] do_softirq_own_stack+0x80/0xa0 [ 1188.549579] irq_exit_rcu+0x114/0x1b0 [ 1188.550020] sysvec_apic_timer_interrupt+0x43/0xa0 [ 1188.550604] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1188.551150] RIP: 0010:refill_obj_stock+0x18c/0x320 [ 1188.551727] Code: f4 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 45 01 00 00 44 89 65 18 41 81 fc 00 10 00 00 77 56 4d 85 f6 75 4a 41 55 9d <48> 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f e9 b1 f0 b1 02 48 b8 00 [ 1188.553718] RSP: 0018:ffff88804b197a90 EFLAGS: 00000286 [ 1188.554322] RAX: 000000000048925b RBX: ffff88806ce38cf8 RCX: 1ffffffff0d15922 [ 1188.555081] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff816e4f48 [ 1188.555860] RBP: ffff88806ce38ce0 R08: 0000000000000001 R09: ffffffff8686479f [ 1188.556705] R10: fffffbfff0d0c8f3 R11: 0000000000000001 R12: 0000000000000540 [ 1188.557503] R13: 0000000000000286 R14: 0000000000000200 R15: ffff88806ce38cf0 [ 1188.558215] ? refill_obj_stock+0x1d8/0x320 [ 1188.558795] ___cache_free+0x101/0x360 [ 1188.559216] ? qlist_free_all+0x35/0xe0 [ 1188.559732] qlist_free_all+0x59/0xe0 [ 1188.560148] quarantine_reduce+0x184/0x210 [ 1188.560719] __kasan_kmalloc.constprop.0+0xa2/0xd0 [ 1188.561240] kmem_cache_alloc_bulk+0x147/0x320 [ 1188.561829] io_submit_sqes+0x6f76/0x85c0 [ 1188.562327] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1188.562943] ? __do_sys_io_uring_enter+0x6b5/0x18c0 [ 1188.563518] __do_sys_io_uring_enter+0x6b5/0x18c0 [ 1188.564030] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1188.564690] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1188.565176] ? trace_hardirqs_on+0x5b/0x180 [ 1188.565685] ? io_submit_sqes+0x85c0/0x85c0 [ 1188.566159] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1188.566712] ? finish_task_switch+0x126/0x5d0 [ 1188.567170] ? finish_task_switch+0xef/0x5d0 [ 1188.567683] ? __switch_to+0x572/0xf70 [ 1188.568829] ? __switch_to_asm+0x3a/0x60 [ 1188.570001] ? __switch_to_asm+0x34/0x60 [ 1188.571137] ? __schedule+0x82c/0x1ea0 [ 1188.572160] ? io_schedule_timeout+0x140/0x140 [ 1188.573585] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1188.574907] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1188.576419] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1188.577909] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1188.579537] do_syscall_64+0x33/0x40 [ 1188.579967] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1188.580547] RIP: 0033:0x7fb2f4fe6b19 [ 1188.580962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1188.583130] RSP: 002b:00007fb2f253b188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1188.584036] RAX: ffffffffffffffda RBX: 00007fb2f50fa020 RCX: 00007fb2f4fe6b19 [ 1188.584798] RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 [ 1188.585557] RBP: 00007fb2f5040f6d R08: 0000000000000000 R09: 0000000000000000 [ 1188.586323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1188.587037] R13: 00007fff53a75bdf R14: 00007fb2f253b300 R15: 0000000000022000 [ 1188.587867] Sending NMI from CPU 0 to CPUs 1: [ 1188.589027] NMI backtrace for cpu 1 [ 1188.589033] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.10.216 #1 [ 1188.589038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1188.589042] Workqueue: phy15 ieee80211_iface_work [ 1188.589049] RIP: 0010:__kasan_check_read+0x4/0x10 [ 1188.589059] Code: 66 0f 1f 44 00 00 e9 4b d2 b3 02 66 66 2e 0f 1f 84 00 00 00 00 00 48 c7 c0 fb ff ff ff e9 34 d2 b3 02 cc cc cc cc 48 8b 0c 24 <89> f6 31 d2 e9 83 22 00 00 0f 1f 00 48 8b 0c 24 89 f6 ba 01 00 00 [ 1188.589064] RSP: 0018:ffff88800891f320 EFLAGS: 00000293 [ 1188.589070] RAX: 0000000000000000 RBX: ffff8880406c4668 RCX: ffffffff83b6bd4e [ 1188.589075] RDX: ffff8880088fb480 RSI: 0000000000000008 RDI: ffff888048d98d58 [ 1188.589080] RBP: ffff888048d98d00 R08: ffff888048d9b3f0 R09: 0000000000000000 [ 1188.589084] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888048d98d58 [ 1188.589090] R13: ffff888044258450 R14: 0000000000000001 R15: ffff88800891f588 [ 1188.589095] FS: 0000000000000000(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1188.589099] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1188.589103] CR2: 00007fb785389340 CR3: 0000000046f5c000 CR4: 0000000000350ee0 [ 1188.589105] Call Trace: [ 1188.589108] [ 1188.589111] ? nmi_cpu_backtrace.cold+0x21/0xbe [ 1188.589114] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1188.589117] ? nmi_handle+0x142/0x360 [ 1188.589121] ? trace_rcu_dyntick+0x2f/0x170 [ 1188.589124] ? default_do_nmi+0x40/0x100 [ 1188.589126] ? exc_nmi+0xea/0x110 [ 1188.589129] ? end_repeat_nmi+0x16/0x67 [ 1188.589133] ? ieee80211_bss_info_update+0x80e/0xc00 [ 1188.589136] ? __kasan_check_read+0x4/0x10 [ 1188.589139] ? __kasan_check_read+0x4/0x10 [ 1188.589142] ? __kasan_check_read+0x4/0x10 [ 1188.589144] [ 1188.589148] ieee80211_bss_info_update+0x80e/0xc00 [ 1188.589151] ? ieee80211_rx_bss_put+0x50/0x50 [ 1188.589155] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1188.589158] ? SOFTIRQ_verbose+0x10/0x10 [ 1188.589161] ? lock_acquire+0x197/0x470 [ 1188.589164] ? find_held_lock+0x2c/0x110 [ 1188.589167] ? ieee80211_vif_get_shift+0x112/0x2e0 [ 1188.589170] ? lock_downgrade+0x6d0/0x6d0 [ 1188.589173] ? find_held_lock+0x2c/0x110 [ 1188.589177] ? ieee80211_rx_mgmt_probe_beacon+0xc48/0x1780 [ 1188.589181] ieee80211_rx_mgmt_probe_beacon+0xc96/0x1780 [ 1188.589184] ? __lock_acquire+0x1657/0x5b00 [ 1188.589187] ? ieee80211_ibss_add_sta+0x790/0x790 [ 1188.589191] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1188.589194] ? SOFTIRQ_verbose+0x10/0x10 [ 1188.589197] ? deref_stack_reg+0xf2/0x160 [ 1188.589200] ? unwind_next_frame+0x1289/0x1a90 [ 1188.589203] ? kmem_cache_free+0xa7/0x2d0 [ 1188.589206] ? mark_lock+0xf5/0x2df0 [ 1188.589209] ? slab_free_freelist_hook+0xa9/0x180 [ 1188.589212] ? kmem_cache_free+0xa7/0x2d0 [ 1188.589215] ? kfree_skbmem+0xef/0x1b0 [ 1188.589219] ieee80211_ibss_rx_queued_mgmt+0xddd/0x1750 [ 1188.589222] ? __lock_acquire+0x1657/0x5b00 [ 1188.589225] ? ieee80211_ibss_rx_no_sta+0x820/0x820 [ 1188.589228] ? mark_lock+0xf5/0x2df0 [ 1188.589232] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1188.589235] ? lock_chain_count+0x20/0x20 [ 1188.589238] ? mark_held_locks+0x9e/0xe0 [ 1188.589240] ? lock_acquire+0x197/0x470 [ 1188.589243] ? find_held_lock+0x2c/0x110 [ 1188.589246] ? skb_dequeue+0x125/0x180 [ 1188.589249] ? mark_held_locks+0x9e/0xe0 [ 1188.589253] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1188.589258] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1188.589264] ? trace_hardirqs_on+0x5b/0x180 [ 1188.589268] ieee80211_iface_work+0x6e3/0x930 [ 1188.589272] process_one_work+0x9a9/0x14b0 [ 1188.589276] ? lock_release+0x680/0x680 [ 1188.589279] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 1188.589283] ? rwlock_bug.part.0+0x90/0x90 [ 1188.589286] worker_thread+0x61d/0x1310 [ 1188.589291] ? process_one_work+0x14b0/0x14b0 [ 1188.589296] kthread+0x38f/0x470 [ 1188.589299] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1188.589302] ? __kthread_bind_mask+0xc0/0xc0 [ 1188.589305] ret_from_fork+0x22/0x30 08:09:40 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000001a40)={&(0x7f0000000300)=@ieee802154={0x24, @short}, 0x80, 0x0}, 0x0, 0x8abb4d2a8b028460}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 08:09:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) socket$netlink(0x10, 0x3, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x83, 0x7}, 0x0, 0x0, 0xffff62ef, 0x4, 0x0, 0xfffffff7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x242e2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x80086601, &(0x7f0000000380)=ANY=[@ANYBLOB="000600"/19]) rt_tgsigqueueinfo(0x0, 0xffffffffffffffff, 0x16, &(0x7f0000000380)={0x2d, 0xffffff85, 0x35}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@nl=@unspec}, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r2}}, 0x3) 08:09:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000290000000000002900"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)) VM DIAGNOSIS: 08:09:40 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822d1631 RDI=ffffffff879eb2c0 RBP=ffffffff879eb280 RSP=ffff88806ce08e68 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000020 R13=0000000000000020 R14=ffffffff879eb280 R15=dffffc0000000000 RIP=ffffffff822d1688 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb2f253b700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb7852cf42d CR3=000000004aac6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000007 RBX=ffff888017e98d00 RCX=ffffffff83bd9a27 RDX=0000000000000000 RSI=0000000000000004 RDI=ffff888017e9ad64 RBP=0000000000000000 RSP=ffff88806cf09918 R8 =0000000000000000 R9 =ffff888017e9ad67 R10=ffffed1002fd35ac R11=0000000000000001 R12=ffff888049082450 R13=dffffc0000000000 R14=ffff88806cf09d98 R15=ffff888018370c60 RIP=ffffffff83bd9a4e RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d526000 CR3=0000000042e66000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffff00ffffffffffffffff XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000