0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write(r0, &(0x7f0000000400)="f8bfe906d7a2cdb7eb1314e22074634886dcb27e94a89f65e496fcda876db9942d11ccbd8d65d25f155580463593cf96177e97188b47061c3ff81beaffd0bdc6289e60f41f47dbb32e6a64a3bc97b68e7737df5ebfd642b64e8c8abcb10d537c05bfd3088019c6df52636afc2b58ece64059a23b0308cb39da7f076590ad4999b197fe60eddb63c0f0e5dcfdc24240e6cea3bc781b358e762cdd732a63e33cda8f88a9c46ccfc1282894d60c50a7ea700038a590b86b19406b81a94258193700b9202355709494ce9200a3443aa5ab9b11612a4c5ea40abbcdced15761d21ad473f868d9d0588e1867db", 0xea) 23:02:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) 23:02:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a1", 0x1d, 0x4e0}], 0x0, &(0x7f0000014100)) 23:02:30 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="122b2f005b31c71dc0ec38bff5f4bb2630a1843617ccbce6e9a66557f26f56ea32c1154e281f351274da80d850d6fab1cc22b4c70eab245cc3edb21e6ade1c0ef8b9990046f1051010f4d40b289c70d11f6d393a31199c774889c559444579a74796c805a38168bf2a58a58982dd12be0ae9dbd00f2bdf5fd56805d2c897c333977fa25840490813fa3143d3646966a766dcd9302b06c4647e14aa4e1d894ca9dd929d6c2b774317dcd691ce0a39", 0xae}, {&(0x7f0000000140)="ebca17efe404f90919683569f32f16bd500c7b9befa3f8ccee1274d19e689bdf9be4642ac3effeb76c4634575476531ca78a6dc7886f985e12", 0x39}], 0x2) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x3, 0x4005, 0x9, 0xb31f, 0x1}) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x20, 0x4, 0x1, 0xb5, 0x0, 0x3, 0xa0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}, 0x4c879, 0x3, 0x0, 0x9, 0x3f, 0x3, 0x1, 0x0, 0x8, 0x0, 0x3}, 0x0, 0x9, 0xffffffffffffffff, 0x6) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) [ 438.287987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 438.317478] EXT4-fs (loop5): unsupported descriptor size 0 [ 438.346181] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 438.360606] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 23:02:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:02:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a1", 0x1d, 0x4e0}], 0x0, &(0x7f0000014100)) 23:02:30 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1409d, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_setup(0xb76, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000580)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x20004000}, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffff9c, &(0x7f00000001c0)={0x81, 0x11c, 0x8}, &(0x7f0000000200)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r5}}, 0x8) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x9) getpeername(r1, &(0x7f0000000000)=@nfc, &(0x7f0000000080)=0x80) sendmmsg$inet6(r1, &(0x7f0000004d00), 0x400000000000070, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000440)=ANY=[], 0x130) fallocate(r0, 0x70, 0x0, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) write$binfmt_elf64(r6, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x2, 0x81, 0x1f, 0x2, 0x2, 0x6, 0x7fff, 0x3cc, 0x40, 0x277, 0xad9, 0x0, 0x38, 0x2, 0x5, 0x1000, 0xffff}, [{0x70000000, 0x3f, 0x7, 0x1f, 0x0, 0xcfc2, 0x100, 0x7fffffff}], "b4634f9a79a54b18e20b9a699eef55b24c7cc9af786c4a284eee2dcee049ffa6ab5c32b32d59d1fa40ab5b3f5a89ad703a22aa3cbf1acbc9ea88210f5ed482a1bcfa20770a341d576821750b27f15356ad31ea11403028349450b8ff6847dcba45797ae16c4e37317d56e1ddba22bf6710eae15adbc300084e8ce51dbd7a0ee58dccb61caf9317481334e121b6d34fec4800cce50f69080d615b8d9ed7a1f53e716a9ba216d49ac8a51f5cb7a90657a7bab40d41", ['\x00']}, 0x22c) 23:02:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) accept4$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x0) connect$802154_dgram(0xffffffffffffffff, 0x0, 0x0) 23:02:30 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="122b2f005b31c71dc0ec38bff5f4bb2630a1843617ccbce6e9a66557f26f56ea32c1154e281f351274da80d850d6fab1cc22b4c70eab245cc3edb21e6ade1c0ef8b9990046f1051010f4d40b289c70d11f6d393a31199c774889c559444579a74796c805a38168bf2a58a58982dd12be0ae9dbd00f2bdf5fd56805d2c897c333977fa25840490813fa3143d3646966a766dcd9302b06c4647e14aa4e1d894ca9dd929d6c2b774317dcd691ce0a39", 0xae}, {&(0x7f0000000140)="ebca17efe404f90919683569f32f16bd500c7b9befa3f8ccee1274d19e689bdf9be4642ac3effeb76c4634575476531ca78a6dc7886f985e12", 0x39}], 0x2) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x3, 0x4005, 0x9, 0xb31f, 0x1}) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x20, 0x4, 0x1, 0xb5, 0x0, 0x3, 0xa0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}, 0x4c879, 0x3, 0x0, 0x9, 0x3f, 0x3, 0x1, 0x0, 0x8, 0x0, 0x3}, 0x0, 0x9, 0xffffffffffffffff, 0x6) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) 23:02:30 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 438.770511] EXT4-fs (loop5): unsupported descriptor size 0 23:02:30 executing program 1: sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000002780)=ANY=[@ANYBLOB="22b8000000", @ANYRES16=0x0, @ANYBLOB="000407000000fedbdf25050000000c009900e4ffffff0e000000"], 0x20}}, 0x8000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x6}, 0xe) shutdown(r0, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002740)={'vxcan1\x00'}) sendmsg$sock(0xffffffffffffffff, &(0x7f0000002640)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x3, 0x1, 0x0, {0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x405}}}, 0x80, &(0x7f0000002500)=[{&(0x7f00000001c0)="e8fb21d38de41479aedc3fdae6060348e2d420faf938a673bbc4b514c1a1ca0e6fd7a9153cde32b6e025631d055bf272faf1fbde2a58b8e0d6fd887204161c222ffc2f4f385eed7b8a0bef0f89170c69288594eb6f2f3d1107852266823228b3923108aac50a3fd1d24214ec61675073c85cca1e89f6afa648e92b9e2814ca1b0cbc7ede886ba72abeac9ee2b1a8918983f49779113becc433a4f24f80e490a234c0", 0xa2}, {&(0x7f0000000280)="e9a22991d614c49ce8da906d817b61b4a0eb357b31c6fc60d747999ab66e1b7f72fc2a47d34afb916246bfde5ad7d7be34a63e8ce6271aff1ebd613f544305b2d13296f803826d23cb327ab0dccefd3d746daf634fa2ca8cb7bb1d8e2168d1bab7507b8c", 0x64}, {&(0x7f0000000300)="e915a4da7b427578bb99511dfd64fd332d5efe8606f2eaf07be081ff1dabeffbb6295806b71ec014fc192a5f4c705628c5e50948d515a13815e5534789a3b24a51f71182eaed605b69e7db15c1a87aa6aea8499fdd7852418ce3", 0x5a}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="4a731725a65a91e6ecceabd427c97280430834888dffc2520cb030e3ebce707a681e91b90e1326c33703d87fab9de7652d612074ac63e70235a1", 0x3a}, {&(0x7f0000000400)="7757c4913901e815a27a6b2dce35a5bca52746d86d6616d961c4a9583c95759ee0697c8d0a17d94637b6f3e6f8edc6aa51dfb86ea5d2cf055397badd54c894300d814759fa89365e096209940ae68a5353bfcc93c5493be593a2be5b220b3a657cef07a39c0eef89638cc36dad9f4551c1308c27d5e9c341010167436b5330482fa7bdef9e62f9955be1b63d7ff1502575278d7397e9fcde69108c07b2e2a5feed7499c4c6a624de7dcb0710ea0ded253e4178058d9af97e0cc1ee3f7d618af1018360acb1f02c73fd724c7a33564e3f09f97cdc148287fc4f6fcec41e848cfa8ae777dc367a2f7988deedaac59007e0734175908441c0b53d635e21257e638b9aac717d3aca48fa404e563273b2e86dd7ddd9f7baed941a1e4d3f756da007e8d09288ad28e12f72a37f4d9f08e2dd5eca7e929058252395c4163f5f8e23ac7249349161ff2e56c49ccda8f5c919fb39235d012cea9cbef6f8ddc7f23734776067175bb46d56b6bc61f5575e4657866b2c7950dfea35a9a6f87e0c3669d7e7199bbcc2ef6d95c81e19d8c09beaaadf16704aa7dcacffa14dd96094886f16ea54a7e24b58a5119ad9ac674e01746145f4a0b8015180e43546464e86bf6166993b59982a8eaa68153cf3847d88909b5eefef35b1bfab37f71e5eeeed2dfb3374f92e04b0a6351b3aa5bc646be7ee7ed1fc50b2ac5ce57e50441bc1f3d3fd0c1aab93be926ca1072cae1698cd46fd3a3f0c05405a19c7d9a8c04d82db39c4ee06cd2812284c0fdf93eeab04390e2141c7d05a51d590e2b16e2f35f68cfdd0eccdacce44e7b121123337bb874e42370ece4959ae62f38274dbb9ab9f034ad6b1ce7390e7ee3b2dd3b16171640b9628ddf01c87aeefc91b832f18810a4e93f4bbf667d5a8065af7c37be05ceb6505242f8238f9542a67c23d9a1cb5d3b515637fdaed98b7a4a165e25eabafe2f59e6ef9693e13737511a1e1f72e7b6ac2700cafc7c2e4a85b9d60706d98d30abb345ea7b75a6ce5bf00776da9173e5ac8e8dbc1e38d96ad244f21a4cd5200142b6d1f4c58e920bc78478f32f9a3b5496c1dca937dbf70ea7773030a5ccd1022d1dee0ea3158ec0bc420079b85387004d84ba7872c418f66ed0c09f34da53399fc0e90122d0fc7a4ee3ccf96dbe35d7ac85893ad3b51b8d12d0b0a112af70d23a0518ed7cc41ed43d56cf2e2c7719b1aa973c19b9968f6ca2b9cbdca6f1b0801d277fcbf1ea5506adea929c2edcfaeb1da78362fc5c1ae105c18aa4af6d397ceaa5776d219c1e667395f801b5940f79b4bf428d0a2cc6d8ab52a95180137e95ec97f2e5fb8fd4a9ae48e3e24d9568877d52dd3e65ad1556f28e368589d5923d2c908c8931bf43b348745d209166517df40240c46c053162ed52d95408bc3f0fef6b293bbd753d73d89d04ec2f2a7b3949c9b8309a000cc6c141d592a0ba50a044ae17f10881e77713bf7573851a31c97e232447a268bf116996e881dd879bded8c69e605761c76412598430112ab9321c6f742050c5c14784a2457093b9847c962b7d764a98c04642e13895b5645b800f79e5da982600080b077731e90de096860a6ae00a79fa950e4f376658bbc9de33b9765028d46b778b7ee88bcb098d4e8bffbb9fd001f1384a13ec919792cc923cc7a43447ee805cd195b71b45214c845de8202f61afc7acf7d379f70d2acd6eca89f30fcd249e539d51261ef854abb940dfe0ac303e27f4539436797701e637266bdc4bffaf09d428e7e094eea72517de464548e7fb9a74196976b305c4196a5135a316da86f0b7cdfefb2ac6ea18aa9330b95ec47b474417db5fe51588710cd74579047d36cc6d20f9b67c4d124add7cb41d9fcd49371b01611dc323416d486d6672aca930dc99a90463d115312c0bf8ee5439bef2c188cbfda5650adf1e1b4e72c4a542419767bd8321de628666889dfd7898f016f6cc4a1b813f95700e2e2b3082edb423605965cede6c30bbe5599f1cca9921254eba6b58684639f0e139d4052a8f54fb8f1408fac50f410874f6a755b520f856c2cdb3a0b3e3925ed2e71b99f1e9c5f10c6a66c3b020e8cdaaea963a55f4fa223b3c4e2ffd44fbf33fb950c432dd085b2f3db5ee38e5d6b07ed0ec9dc90de80e158d6a20e99638ee10e9c710c35f65aec445d6c2cb06d6746a05f2542b9ea6bf309ef0b1d148c03f61860d706f1efbe9d239c25e50d9caa7c5ad9d53deaac3b0ea14d18e2a47d2ae903eefcd7879a4febc246deac5268f52415ca386923021d6b4b536bdf092fb907a65c5a11efe49bbb992caa190561f6b7f52c95673dd3729b8bb1722f6b6e8944fd4abc2352b01af28506322ad5eb7215ee6e4b990ea5f8b8782a2fa0eff86f9fe01c9133d1b5ee26cc36cb0c90bffce7d7755417b75181531d1f541807a639c8884709d204d57085ecdd53ad2ace172f568f1868a0c53b0861aa99e2a08ecb2abdea40c8a8ec965a9c6ab26bbb84e8941bba90c6412eef9836941a28fd088a352bba890c200fc685af713213c2ec775627ec1f74034ff2d5bcc1950b9c821a3e3248ff563e8c33512ddf026d0d99d6bf8a265ee2caf4d23de35ce08c7d7ebb0eeec0979afce59cd8512fcc22308eef7b67e85251660653f72d58de49dcaea98cca29246ad7cb7229e72a431e8c77d143b0d968effe37980ffd17e2a96a5de806856a8326ae1040386d9a4dd9f43c93371cc88b962026438ca39c180e5d0902479bc4d67663a1b2c15308706db2420a2f5e6e02d5cec0e207b28c11215d3db1dd9bbfa19f6cdb6bf8cff55272ff2f0da152671f92620644dc4a8d9566a782cffa1109974643e2fc409fbd9880a6ac4d20c4afb6ea5bba41810151f036ce5b92fb315c0d38bb90e6e0d9c5406a1c0d8fda9fa015db1ca67bf361e97d704ce8daa6c8e18c3d10635fb97c28fc981a295dc8e796ee5ea5e1b0e61610ded6bccdcdd154976a8bb250a6c51941406feae985a81cb79d28787cc6f5aff33e6585bf70fe17d9f48847c1f2975599848eb743f44aecef6bde5443bf7c19f24857aa906eeaa388e059dfbcd4bbac22fdf04515d942e05aa86ed2ea1ee186867df2571e26962519a01230701206d382486a77522e1712d42df978810dfe15bee8799d6b49b08cb97ff1b96a7c7c335ca6168354f5a70a3126de72df77f6aa4125bde088740bec0f8b71427df9cae37cb76a511a97bd685da3a5ec3c9b746acf5e8778154b2d3c55e388a04ae00db7cc5e80f6cb436a708574c58a3de404002dde471155d61721a8731ab18c2c67d1b497a73f64173036e0492c024b6cc064150b9d27e5531bb3285f964b3b3b4c50c87b9a5aa461e88ce45dabbaa1e8dc5a34693d78741eb163a6c3be373f027567e2070152fc1698eb374df8d73a96af59eba52111d1822793eb46aa6b8794ed5b1b5f55f0804ff910026aaa4db2fab8188daf7b6e0124c70378f4a4536fc3701152a8ad81479a8d7e786a061883673f5fb1cc241920dff840363e05c5ebabf42858dc74f16eaffa8af4a87e28517a7a93160510736b5b7a128e57d4eeb318e491f71b19fa73bf91d477a5ab9786099d67fb8b1474536133813fd307479ffdee7cdb3c11ca8345aa9b3e2ab2498351929ac9edbcbea8a8df291224e1a0f536b3f952a0dd771ff7297f403bd521f66976f5661b3e2a0e5e283acd268d0ffe8c0b7efd95b14a740618cb6912bb508cbd3c9d41ff4af6ed9f92459a1d193ca182c2a29a9f854b074ebe517982e064b232645ee45354ea2ca3de7977745e5b37f312d85683c04b6e9a69be814aeb8b1b6eaafe3af11c23bd52a3907a8e1cfbf47714f959fd9964f4aa407fa1a06d211965736450b82d6df145b2667300b2c70b1bbdd9e43f83680d6acbe8ab1592488567c5e770af86045f5953826b4d883afd0d279c91064b264dae3bd5bafc2abf0d949e6b0fea7238200ae5aa748ad61baa8ddc1faf650267a26b7307af394c89549d12ac6455d97c1434d1631b30e31dc5ff85ef40df7010b34fb3104ff197c017ece0f51e108066eb2ae4380ab17e521bc14cf3add16d58c2ccc786dd7313c9aa72f7dbdd850ec795a2436daef2b205309a7509fcc2f61539570f18ba5fa85720a583f080e2b0db221f7066c593336d911a0419f58c92b8015cd9bec2a477a9c8f85728e4f3aaa69f894d911e179627c767bf737ad54cc084a6de88ee2648bee4d1d2486397750e82a50de7435fd7ac248fcc556b510a2a838a30e9b46cd8ec5eba74a87e055054ea35fdb72e55801adc73c2e047c69f0753586955ed159b3a35b526b44b0c754c4a15b2b4ca5f4f9a827ea5f113bd6bbad2ae895d157aa35a83e9ec8decd47e23479aabaa46b4fe373449c66a89d946482c0fbec60c995935973f939cf55152dc6c2d61416824e04ad8fc7ed811380af4267dfe5cdeb549055cb828487fc246c1b9f54e0759e5bab2c798efd217ee4f910c403e8298613b3557c3343ef6b8809ebe1981223c9b009e8dd39fd6905e5acfd34b9eb0a29ab52ad608106a3433b7a1172a96a7e54fb37636d37655be953e1facb754b7a4d96822e403050172c5cb395f17ec79a60762e941a6736de7e9e27d5d40f7866923c48ade88edb1a8c03b36cd6103a85d12c80fe07093ca2b3f51beee54f47f011ae19c898772fdd263e95d59f6e9e4e30a1090b249af7fb1e57069f68b945354378169fff5e3f5a9402a5dff8415fd5ec742ae7540c2d0cd6f3d8c8e128357bfd9fd849ef931371a10dda6a17f92291494d45642bedc24a34077a08ba8021c3d93e3eede77688dc284702bff0b2772e6b4d1f39238d8d8ad822ae82c2cfdfd40a66e0f4fd9455428f16b64c5dea359b27c7e0134ddb3751d67c934ed712ad113d45b188b6ec9bee611c446fab784a96120edd0eb23fbbd3ca18c796ddfb0741af8195de92dae53dacc5dd3c1ef2403a956de99bc5a0d01c369db05916f30a6d84e5f828ec497f45098c4059dcda7bc1a9d9055a4e3a1e33e3b793d93a71fc64cd5bc9007389977bed6e5f0483ce612969741a80348faecd21f236e04387fd70b2bc8f5618491121627f3f20e0472d7b22be3a5f8cb4b4e47b46aade7306dc96a36b4a069eae841d61ec428c28cc9b1ad40f4daf761da78fdba1730fe0bd47f3fafce090c68732830188dc2b53d5ccc7c8d2d666c84687b4b2d3e42da89693ded890e54dc7ec6c4ac2ca57183d8d643b23edda3581544ce2d6f39977384a4b0f30bb11640c87aa8c6704336614fb392f5f31e34150a46daf6f106eac3f813635eab254989136b7a7f8262456ebbe60a5ad5aae0f6d800c6422a5e6914ff72bd64e58c365cf19803ba44079a1e13916d41d8eced562e9b2852aa6797513c7d4957cfc7675db44dd517f5dd90672a4e0415004bf2647e8d570dfcf592a79df38bebffba26ac09496db29e598386f0b125df6d150a9bd5f178fcf9a45033068adcfb76b5c22de67df40f83ea380fead8cbdb32469411fcb4138127ddb37db60bcbcb8edd7d61695facdce7177127e8efb88950408052bce8250da081844d4990b003fdf72c5b4f7a11bb758a3dc7ef86c705303884949f4e9334eab83484062f961cafc37c9d894c5ede0b15db1606aeb844c762f3d41dec1de93e10cfde646cf125d9e1fdab7d98095f671c06f5eb6bfa182f9eb78161ec19fcaa6b8f726bb926b0c8e4fab93b2d28b8ad8e2447b8592439e3e6c1140f66b66b8478f50c48e4a5419df1785b20ec813a16f0624fd6e5df69449fb38b5972", 0x1000}, {&(0x7f0000001400)="6e4b70189f69fc2f5d341f13d267246ad0b682cca09de1ca987780b90b0dd68da3eaf3b6978a743ef0a4cf33c94110c0ff411edac2a4798ccc5aa5cecabb3088c17edf2fb025a097c34ecdaa7473e9661725ef64c8a2630c37e1c55c5632cb00551caaa6bffbe35245a105e4cffe4c01939088c02143dce7a2f0f8a79ec2c52623726e34b8f0feb9d1a26e7ce124b1f8127bc04eb7ddd71189bade77024a18f63b14e6", 0xa3}, {&(0x7f00000014c0)="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", 0x1000}, {&(0x7f00000024c0)="405acf14bb603a905821b087d323dafd8883a0faf0825b9505127f1b1611818419a625c20123cc", 0x27}], 0x9, &(0x7f00000025c0)=[@timestamping={{0x14, 0x1, 0x25, 0x87}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffffff}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x60}, 0x800) mount$cgroup2(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000002680), 0x3002020, &(0x7f00000026c0)={[{@subsystem='devices'}, {@memory_localevents}], [{@dont_measure}, {@measure}, {@context={'context', 0x3d, 'system_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+\x02-'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}) 23:02:30 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:02:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:02:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:02:31 executing program 4: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:02:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 439.191701] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 440.771424] Bluetooth: hci7: command 0x0405 tx timeout 23:02:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3f", 0x1f, 0x4e0}], 0x0, &(0x7f0000014100)) 23:02:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:02:45 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000200)={0x2e, 0x12, 0x4, 0x3, 0x5, 0x5b22, 0x80, 0xfc}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0xfffd}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x8002, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665c", 0x30, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="337e199143729093622b2f6d52106dc1"]) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x1293) ioctl$RTC_UIE_ON(r1, 0x7003) 23:02:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) accept4$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x0) connect$802154_dgram(0xffffffffffffffff, 0x0, 0x0) 23:02:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3c4, &(0x7f0000000000)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "961517", 0x38e, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @ndisc_ra={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0xf, "311c1c5f30690bec8e727b3c866a73eb26f3ae5e2774b32ed67dffea2d4b08a36dab1da3177e671c1151de6c95ac83c4b86abbaddce466e4fb0fce1c126765d56317b4cc2550c30862b02c3c4ca7b3cb67b07f522f86ecfe9e3448e94f529a10bc80392b35e76a1604ffdad8874b8e945857e90042d6f045fbb994"}, {0x0, 0x15, "683ff6cba5a042d30ed204fc61fd79299beddf84b5dff27ae963f4fd32cc3fd9fe4ae8887852dba81747700671f81053be5764d6a30d71d014466c298a52843e80716b442b76d0390c96eaad8cd8fcc99c754dce884acecb6877861412a3477306183e175be590a99e9eb3154d016a0e17a491714d170ba0152d52e67966353caf7fd955eeb224e4c3c742d41ee97eb09d7504c68d77206fe21e7a263625b49ed385e541f744b6"}, {0x0, 0x1c, "29e70acf91761cb9196e139e3fdfe1c00205ba9571433c766ab1fa285a39f9a91e8dcf6954dfb2845c66ba88ba43dbd6a14929d1318f2709a27f5dfcdd0b38da5af0a28b214ea330a5b719bd30372c0bd524cfc5228761fb76925cbfb369a02457de445e1d03b0947265a8716f46c450a90d001c5f5618c44eb199e6ceb0c692a78408663923c2d4e2b569ee4b3c7942972f07a0b9d9c64f198cd7f55f6ca0d01db4375f34705f661337183734b2cce24659add4d2d1434bdc35bb7f604ed546f328fcfafedc6b37203c7ccba8737cf05c3381f01ab19697ac11d6d1a9f6e2ed4d9e4fd3b6"}, {0x0, 0xc, "2562be125b4ef57aa156e9edd9f095b240b1542a66addad202b7fe724b26048591ab58997ed9be66ab128bac885947c859a0792903d945895b98fdaad47889c9dcf30176f12550aaebc88548bd70ebd936c440ae4ec1c73cd82f5903da3778fd"}, {0x0, 0x21, "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"}]}}}}}}, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r1, r1, 0x0, 0x3) write$tun(r1, &(0x7f0000000480)={@void, @val={0x3, 0x0, 0x6000, 0x6, 0x9, 0x284e}, @x25={0x3, 0xfd, 0x23, "d68b2334e8cca138fe40873b4f64d1910b1b227db80c522d14e25241a80293591126dc6cc47be0d33badb42441889d5aaf84f51522206f3feaa34826feaf15bfcbb51228c8755760"}}, 0x55) 23:02:45 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x179) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) bind$bt_hci(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000140)={'wlan0\x00'}) inotify_init1(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000300)=[0x0]) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r3, 0x400, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4ff, 0x4e}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x8001}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x8000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write(r0, &(0x7f0000000400)="f8bfe906d7a2cdb7eb1314e22074634886dcb27e94a89f65e496fcda876db9942d11ccbd8d65d25f155580463593cf96177e97188b47061c3ff81beaffd0bdc6289e60f41f47dbb32e6a64a3bc97b68e7737df5ebfd642b64e8c8abcb10d537c05bfd3088019c6df52636afc2b58ece64059a23b0308cb39da7f076590ad4999b197fe60eddb63c0f0e5dcfdc24240e6cea3bc781b358e762cdd732a63e33cda8f88a9c46ccfc1282894d60c50a7ea700038a590b86b19406b81a94258193700b9202355709494ce9200a3443aa5ab9b11612a4c5ea40abbcdced15761d21ad473f868d9d0588e1867db", 0xea) 23:02:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000003c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x527, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000280)="c976179db31c77918b604d73f1623e3555d2afa163114a4680cbccb10aea29641c331469581f1a5ae5186bf9faf5132fe6fcc5194c71b918b3ae5bdc6ba35bc8a633fb123e988a95a47a7d566da1b47819986dd032e4d6465a0104cd61ddbd7fddfbf7ef25914a64ee3bdf28c6ceedc72b5759e7850e6ba51e2a943df9537bdbc52e9a89a5f59ed635e910f244d46d1173480bd9c12f3088c26d828460798651", 0xa0, 0x40000000000}, {&(0x7f0000000340)="89d9435518f2d1c2403c2b108ab1e1c73df8596eb9618efb507f7b36bcf97b3bdfdb7eb2a6b47d2a2a79e4c192a1934eeacd1af125a6cb932956edd6ac3b7ef0ba506e6421be5f2069e50af88642e876a20c13d3fb5622cfeb1ed4c55b419c07c38ff2c486dc81ecd42d6e2e2ed971454e748d5f6ebffa0d89fe3ec6f3cd7962d6ab38478cc34b25b1dd822fc74b860d1a8e4cb8a1d860601a19818c4d566d7ebee04f97445011f30b27239513fdba419435c7c9e6119d8254a48cab23796f51f6bdc7d791e77db9c67bc73385c595ad336ec68fd158269f92855fc282b322476195f2a7bce99de203620a77cac9f9e6521c", 0xf2, 0x7}, {&(0x7f0000000440)="22ab6b8fe2eaf6c7c9bcc1779757f0624a9d85401a28693f7f97053ce574c2a5f382fff37444f663de0a8b406b95f7422211b0a54a7daf53f384e5ffb57e745a9d8b8bfdaa318236dd1a28fe2778841a4937ab966f8c6c69f87a7c31eaf582e34406c9aa37c390c3952a85bfffdab438ac0930d7fb40dca1120ce352b2", 0x7d, 0x6}, {&(0x7f00000004c0)="29a796d4d3d2abba69893ec4b2ffe456dea6b5c410a9091e3318ec56261113381e6fe6c7d1b974187c3d04a3ff96475b7fe9330ff9139e83e419880aa8da3f0ca5881b8e08272a081c6770", 0x4b, 0x5}, {&(0x7f0000000540)="3a1da7c8b201f504b1ce30d3e74ee0abae192d68bba3003e2265abd1d17b9b66d0a23e0196028590d1dd16a0a201606e7363a98922429a8f55624d558f41d53cecfa942b9a7ff77552e751702ecfa5086349684666f20410cb1b8d78906a98926e8ba1d75d071b31c392ccc8074f7b7f66c0453758521128c680345fbbbc856d9f05ba3d94ae4f402713343722a209621545ac4e936f02ad36bf0e55917b8cfe01881c04e4e74efb2a34b4e2c62a52361fb720c4b398d0dd7a076d24f95dde779163eec4f85185fcb395b189ab20d4cf61053374cac87d5481d1611f9756209411f3daa5b4ca3b4b282277c5f188f786adc302be997b04d0ed", 0xf9, 0x2c004e31}, {&(0x7f0000000640)="96e90229f06e70bcfb6b70cccfe656ef54754c1bb68f505f9a32d4edc53c65e509930461583ce6381f27e81924b1f2d545e613789bf800abb49fbca102a92b727033e01ce4f9eef97808b12633aac16cbc82fcb13bcdaf85f6f465533bd10ff718be19a3a3507b", 0x67, 0xf1}], 0x106a807, &(0x7f00000001c0)={[{@shortname_winnt}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@obj_role={'obj_role', 0x3d, '!\'\xb1'}}]}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0xffffffff}]}) creat(0x0, 0x0) 23:02:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 453.608471] EXT4-fs (loop5): unsupported descriptor size 63 [ 453.618693] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:02:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 453.663352] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 453.667035] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 23:02:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3f", 0x1f, 0x4e0}], 0x0, &(0x7f0000014100)) 23:02:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000300)={0x3, 0x0, @auto=[0x24]}, 0x9, r0) keyctl$get_keyring_id(0x0, r0, 0x0) request_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)='\x00', r0) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, r1, 0x0) keyctl$link(0x8, r0, r1) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000, &(0x7f0000000100)='/!-\x00') clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 453.756786] EXT4-fs (loop5): unsupported descriptor size 63 23:02:45 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r1, r1, 0x0, 0x3) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES64=r0, @ANYBLOB="2a48d1843f55", @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRESHEX=r1]) inotify_init1(0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYBLOB="01ea00018000000000000000", @ANYRES32=r2, @ANYBLOB="04000000000000002e2f66696c653000"]) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r4, 0x810c9365, &(0x7f0000000280)={{0x0, 0x10001}, 0x100, './file0\x00'}) inotify_add_watch(r3, &(0x7f0000000080)='./file0\x00', 0x40000070) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 23:02:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3f", 0x1f, 0x4e0}], 0x0, &(0x7f0000014100)) 23:02:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) accept4$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x0) [ 453.892869] EXT4-fs (loop7): Unrecognized mount option "0xffffffffffffffffÿÿÿÿÿÿÿÿ" or missing value 23:02:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:02:46 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:02:46 executing program 4: sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="17d2f871c4a1", @ANYRES16=0x0, @ANYRES32=0x0], 0x48}, 0x1, 0x0, 0x0, 0x8080}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) write$binfmt_script(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c653120202e2a2020207d5b0acbc31f822ab809edd1a2b00ad585d667ad3b04e29a2806b151170473f1e249845a1609c2427080a5191ac499204e64ea0eb555861fee68c0a8a0c0fc6dcce0f23801971ab44d2066b1d963f294d8b5220c000000000000edb0e3512d695e1e0ffdbae7c9193d7d915eef2afd5fb0ba5c8c9a504fda01e60500f3169be8a8153aa61376ccb1b5c006784e73a643337dd2ce6b0ba64846a90000010021f7e9ac377ae9fc90"], 0xc1) fsetxattr$security_evm(r0, &(0x7f0000000140), &(0x7f0000000340)=@md5={0x1, "080458d22d949e111c291ec5905829ff"}, 0x11, 0x1) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=@hci, 0x80, 0x0}}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) mmap$IORING_OFF_CQ_RING(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x8, 0x810, r1, 0x8000000) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) dup2(r4, r5) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 453.980043] EXT4-fs (loop7): Unrecognized mount option "0xffffffffffffffffÿÿÿÿÿÿÿÿ" or missing value [ 454.016466] EXT4-fs (loop5): unsupported descriptor size 63 [ 454.017680] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:02:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) 23:02:46 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(r0, 0x1, &(0x7f0000000140)={{}, {r1, r2+60000000}}, &(0x7f0000000180)) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_create(0x5, &(0x7f0000000240)={0x0, 0x39}, &(0x7f00000002c0)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) recvmmsg$unix(r3, &(0x7f00000010c0)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000800)=""/42, 0x2a}, {&(0x7f0000000840)=""/51, 0x33}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000a40)=""/70, 0x46}, {&(0x7f0000000ac0)=""/243, 0xf3}, {&(0x7f0000000bc0)=""/25, 0x19}, {&(0x7f0000000c00)=""/3, 0x3}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/189, 0xbd}], 0x6, &(0x7f0000000dc0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000e00), 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000e80)=""/104, 0x68}, {&(0x7f0000000f00)=""/142, 0x8e}], 0x2, &(0x7f0000001000)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}}], 0x3, 0x0, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES64=r3], 0x14}}, 0x0) r5 = fork() timer_create(0x3, &(0x7f0000000000)={0x0, 0x2a, 0x0, @tid=r5}, &(0x7f0000000040)) lseek(0xffffffffffffffff, 0xffffffff, 0x902f90f22c7c3cf) read(0xffffffffffffffff, &(0x7f0000000080)=""/65, 0x41) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 454.171860] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:02:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:02:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1", 0x20, 0x4e0}], 0x0, &(0x7f0000014100)) 23:03:02 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ftruncate(0xffffffffffffffff, 0x1000003) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x4e1e, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x47c0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x0) shutdown(r0, 0x1) syz_io_uring_setup(0x6ad4, &(0x7f00000000c0)={0x0, 0x198c, 0x8, 0x2, 0xae}, &(0x7f0000ff7000/0x7000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x7, 0x8000}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x509940, 0x11) unshare(0x48020200) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 23:03:02 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) 23:03:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1", 0x20, 0x4e0}], 0x0, &(0x7f0000014100)) 23:03:02 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:03:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) 23:03:02 executing program 4: bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000000c0)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r2, 0x7, &(0x7f00000000c0)={0x1}) ioctl$TCSETSF(r2, 0x5404, 0x0) r3 = getpgrp(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) dup2(0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file0\x00', 0xa9) fcntl$lock(r0, 0x26, &(0x7f00000000c0)={0x1}) close(r0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000600)={'sit0\x00', &(0x7f0000000580)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x1f, 0x8, 0x8, @empty, @rand_addr=' \x01\x00', 0x7, 0x40, 0x4, 0x8}}) sendmsg$inet6(r4, &(0x7f0000000640)={&(0x7f00000001c0)={0xa, 0x4e24, 0x2, @remote, 0x4}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000200)="e4a8131fa862f4c0451a69a655cd1b3874ac0147b3afcf2338b7f3d2ef23e98b4984837de02a459ac774169101aa5278ac6f5b1aa8fc26d79f2c1975e8a9732ac45559288bdd0f0ad3fb38bbb84db3ad8f3caaa439d1f92a7c1dc4b58b25bee02bdc5f0b5dfaed52fa1bdc59364300674d73673f7db58bbec097fcf860aed2d29bc9c7e9bacd", 0x86}, {&(0x7f00000002c0)="cb3bc8a7c36450d24e435e9f795578ee874173b3b0cf0f75084afa5e92736fdcf77bdf01954166f0ec7d97f610425e57edb6c392ea0d3e38354fddf85edd26d77ad8d4ee7081ffcd01f402be322cff5b2f9d1704c08c338b4b4c37545eb766754da81cfd66619103a3a46369dc37c6f00c66eb5c22459627e5623fcb530363ce05ab2cca9c20586496348b036db51e0252636f65d82ffbcb1cf151c4faec1d689e3f0379f1adfcc75049eb9425635e2dc096ba206258c1f7c3337be5b21322a4fd4c352229e1cdaa74fa0ee68c14d4", 0xcf}, {&(0x7f00000003c0)="07d568a55bcbf0a15e492856ce5724bab07f604e7eb011edabd6f0553d6f2e3d0f1a4a02aaca169666b2bea32e2c15aad60b853fb261fbd75077f33f19de3462f46a6278fb45ac4bc92fa77ead4a1b1bdf85d0d9edd4056174f9fa14b8421cafd507d9c54d3746670a32465f1c5fe4dd99c67f2fe8b1aba30163a6dd48c76d4eaf7302ddea39989d0dfefa3b7b21a7f933c16243be389f96660fcb3a022db4939c5bba2bdc9f67b997c1ce452b04aaed2ac6ef990e2a83e010e1247bf846ae8ec972f8592a", 0xc5}, {&(0x7f00000004c0)="c314b24d95c1d6ca440794e633b4bbcb52d304d2f632b552449388b47c475baa1f7c71ebd0d67c753dcb4fc9c16e0a8947dbd6cf5f5694fd75b3", 0x3a}], 0x4, &(0x7f0000000700)=[@dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @pktinfo={{0x24, 0x29, 0x32, {@private0, r5}}}, @hopopts={{0x20, 0x29, 0x36, {0x21, 0x0, '\x00', [@ra]}}}, @hopopts_2292={{0x18, 0x29, 0x36, {0x4}}}, @hopopts_2292={{0x1f0, 0x29, 0x36, {0x2, 0x3a, '\x00', [@enc_lim={0x4, 0x1, 0x9}, @calipso={0x7, 0x48, {0x0, 0x10, 0x2, 0xffff, [0x200, 0x400, 0x1, 0x3ff800000000, 0x3, 0x8000, 0x0, 0x81]}}, @generic={0x4, 0xa7, "032c9d19bb6e8015d32ed1437a60d86ebe4a53721f827c3af3f7262b29aaf9f640b2a8c45eedcf0494c7727e00f320b08a6b4744dbd150aaf51ab820ebbe13fbb438dbdc3d68d15f10e6f1a6d14a559bdf3a9e6401c1c711d43c145baa49981026fa4fad53bc0bf205ec6d35f91ffc4ffa36b52dc54e719c8165b2e84d1f23f43a7bb9dd483fe0a1122eba734da116f076fb3940a67cadbb614b5b7802ca0aef425be212da1ec4"}, @ra={0x5, 0x2, 0xffff}, @hao={0xc9, 0x10, @local}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @generic={0x88, 0xb8, "dfe7afc425bc3d112f912f1bb20c2a560537a263ec31355d33e8c3874bb3c689ca0d510db9c2e176f7a158ebd3985c844726e30501bd451f42a07dbd7e45be28f894f00d3b7d33a97e9b6ef7e95762302731f5061f8c81f65434ff45bce07de67bc47f4c0711c0c0cef57e17dd31bec936a9f331bcd44fbe92af3148520011156702eceb8d98fcd7772d0ad6d1b920d9827fe141df3c86ca682ec1f81f107487e12b7917d7814cf2cb33bf6bfe71bc966d5d4b5dbbbb2577"}, @enc_lim={0x4, 0x1, 0x1f}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @hoplimit={{0x14, 0x29, 0x34, 0x86}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}], 0x2b0}, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044001) 23:03:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:03:02 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) accept4$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x0) [ 470.481705] EXT4-fs (loop5): unsupported descriptor size 41279 [ 470.519950] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 470.529804] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 470.533670] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:03:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1", 0x20, 0x4e0}], 0x0, &(0x7f0000014100)) 23:03:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 470.630426] EXT4-fs (loop5): unsupported descriptor size 41279 23:03:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21}], 0x0, &(0x7f0000014100)) 23:03:02 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000280)={0x80000001, 0x8c5}) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:03:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:03:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) 23:03:02 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) 23:03:03 executing program 1: syz_io_uring_setup(0x457f, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x3, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000180)=0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, {0x0, r1}}, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001600)={&(0x7f00000002c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/218, 0xda}, {&(0x7f0000001440)=""/150, 0x96}], 0x3, &(0x7f0000001500)=""/242, 0xf2}, 0x0, 0x100, 0x0, {0x2, r1}}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000040)={0x420000, 0x8, 0x1}, &(0x7f0000000080)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r1}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000be000000000000be000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000be000000000000be252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011100)='\"', 0x1, 0xe000}, {&(0x7f0000011400)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000001640)=ANY=[@ANYBLOB="ca78f57aef34daa27c845af7f30af40323c393f59ba75fd7ba87bc50ca54fca6b63f6859afce67a3b21f50f3795dcf9e4f139397dae37ca21878adab4aad85c4d698e02c9f698ed6939a62dcc92d5859f5cf585a28a9f1cc765a22307aa7650595e4f8ea00b8e222d09bc4319efbd83873bcd9b13cfc3b77"]) [ 470.813894] EXT4-fs (loop5): unsupported descriptor size 0 [ 470.904413] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 470.911453] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:03:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:03:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x40, 0x1, 0x6, 0x0, 0x4c49, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8}, 0x1, 0x0, 0x4, 0x7, 0x0, 0x0, 0x1a76, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x3, r0, 0x3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x81, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)) fcntl$dupfd(r1, 0x0, r3) r4 = pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfffff706}}, './file1\x00'}) 23:03:18 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_NEW_STATION(r0, 0x0, 0x24000000) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="54bee65b20d2bddb5238dfdc7a6453aeaa139db8bb5555e7aa5fbdf7bb28e8dbcc75dcb63eb610ae8a411109a91495a596388ff3ae53e39e", @ANYRES16=r2, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="14005e00000003ffffffff000000000000000000"], 0x30}}, 0x4004000) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x2, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff0300d2100000002e2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) sendmsg$NL80211_CMD_ADD_TX_TS(r3, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, r2, 0x20, 0x70bd25, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x4, 0x34}}}}, [@NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x2}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x5}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x7}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x7}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}]}, 0x48}, 0x1, 0x0, 0x0, 0x40010}, 0x800) io_setup(0x3, &(0x7f0000000000)=0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r5, 0x1, &(0x7f0000000480)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x3, 0xc8c, 0xffffffffffffffff, &(0x7f0000000380)="08022169cc4783fce7a8f5eced0a5d53c4d3c6b730a897b94e564c6aa887639984fd4204bd17d747ad742524c3593e96b72f878a2c1cbf84cb65d61ebf89d4cb5a233dbd96efdc2f8fc6e9d775e98ed6637d4f3c28c9aa126bbcc67703676827986ec4c5b730fe5fc8cb2318c426bc924a224f84a775ac23572c9a9e39f366a3f2e099410e200f21", 0x88, 0x8, 0x0, 0x0, r1}]) 23:03:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:03:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 486.063307] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:03:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) 23:03:18 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000280)={0x80000001, 0x8c5}) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:03:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21}], 0x0, &(0x7f0000014100)) [ 486.143943] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 486.151115] EXT4-fs (loop5): unsupported descriptor size 0 23:03:18 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000280)={0x80000001, 0x8c5}) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:03:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:03:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:03:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21}], 0x0, &(0x7f0000014100)) 23:03:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) dup2(r0, r1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) 23:03:18 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000012c0)=""/224) shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000fee000/0x12000)=nil, 0xb000) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_LOCK(r1, 0xb) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000001e00)=""/4015) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000400000/0xc00000)=nil, 0x1000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f00000000c0)=""/25) 23:03:18 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000280)={0x80000001, 0x8c5}) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:03:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 486.402319] EXT4-fs (loop5): unsupported descriptor size 0 [ 500.587570] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:03:32 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)='3', 0x1}, {&(0x7f0000000180)='\f', 0x1}], 0x2) signalfd4(r0, &(0x7f0000000080)={[0x100]}, 0x8, 0x800) 23:03:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:03:32 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000012c0)=""/224) shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000fee000/0x12000)=nil, 0xb000) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_LOCK(r1, 0xb) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000001e00)=""/4015) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000400000/0xc00000)=nil, 0x1000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f00000000c0)=""/25) 23:03:32 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:03:32 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_NEW_STATION(r0, 0x0, 0x24000000) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="54bee65b20d2bddb5238dfdc7a6453aeaa139db8bb5555e7aa5fbdf7bb28e8dbcc75dcb63eb610ae8a411109a91495a596388ff3ae53e39e", @ANYRES16=r2, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="14005e00000003ffffffff000000000000000000"], 0x30}}, 0x4004000) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x2, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff0300d2100000002e2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) sendmsg$NL80211_CMD_ADD_TX_TS(r3, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x48, r2, 0x20, 0x70bd25, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x4, 0x34}}}}, [@NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x2}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x5}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x7}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x7}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}]}, 0x48}, 0x1, 0x0, 0x0, 0x40010}, 0x800) io_setup(0x3, &(0x7f0000000000)=0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r5, 0x1, &(0x7f0000000480)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x3, 0xc8c, 0xffffffffffffffff, &(0x7f0000000380)="08022169cc4783fce7a8f5eced0a5d53c4d3c6b730a897b94e564c6aa887639984fd4204bd17d747ad742524c3593e96b72f878a2c1cbf84cb65d61ebf89d4cb5a233dbd96efdc2f8fc6e9d775e98ed6637d4f3c28c9aa126bbcc67703676827986ec4c5b730fe5fc8cb2318c426bc924a224f84a775ac23572c9a9e39f366a3f2e099410e200f21", 0x88, 0x8, 0x0, 0x0, r1}]) 23:03:32 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:03:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:03:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:03:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 500.767510] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:03:49 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) socket$inet(0x2, 0x80000, 0x80000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:03:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x180}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000e40)={0x1c, 0x0, 0x1, 0x0, 0x0, {{0x11}, {@val={0x8, 0x3, r0}, @void}}}, 0x1c}}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000003c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000400)=0x5) pread64(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff8) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./mnt\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000005080), 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000001380)=""/213, 0xd5}, {&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x3, 0x5545, 0x0) open_tree(r3, &(0x7f00000002c0)='./file0\x00', 0x9100) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) 23:03:49 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:03:49 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={0x0, 0x0, &(0x7f0000005d40)={&(0x7f0000004cc0)={0x24, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x9}, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x2, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) getsockname$inet6(r0, &(0x7f0000000500), &(0x7f0000000780)=0x1c) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x5}, 0x409becb7bdf85d3, 0x1, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = dup(r0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="3a02000000000000c910fe8000000800000000000000000000bb000000000000b83f172c8974e42e9a8eaef16726bd14ce0d64fe59d1964be1ffa52a1d4911553e585e7f20df7df093c70431698cc04983"], 0x20) 23:03:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:03:49 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000012c0)=""/224) shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000fee000/0x12000)=nil, 0xb000) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_LOCK(r1, 0xb) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000001e00)=""/4015) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000400000/0xc00000)=nil, 0x1000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f00000000c0)=""/25) 23:03:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:03:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:03:49 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 517.082940] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:04:03 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) socket$inet(0x2, 0x80000, 0x80000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:04:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:03 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:04:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:03 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000012c0)=""/224) shmctl$IPC_RMID(0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000fee000/0x12000)=nil, 0xb000) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_LOCK(r1, 0xb) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000001e00)=""/4015) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000400000/0xc00000)=nil, 0x1000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f00000000c0)=""/25) 23:04:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xbfe}}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) sync() 23:04:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 531.716453] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:04:03 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:04:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:04 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'veth1_vlan\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@private1, 0x0, r3}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r5, r5, 0x0, 0x3) setsockopt$inet6_tcp_int(r5, 0x6, 0x11, &(0x7f0000000000)=0x3ff, 0x4) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'macvlan0\x00'}) 23:04:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:04:04 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 531.962659] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:04:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000080)=""/64) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000040)) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={0x0}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000001300000018000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000840), &(0x7f0000000880)='./file0\x00', 0x8001, 0x1, &(0x7f00000018c0)=[{&(0x7f00000008c0)="7d3c3ccb53bfc7a526284d073c00190c003bc5a3cc49dbdfd2d73cae6e31efd15f4106a7b1b6c4864ca16a010b840f26963d9f39bdca211ab93b6a2f112eda471a3bd07b8ea9a22b821d40facb63e44d2ea353b07a0e3ca438ba1a6bda8fc6217e143c5b7d73343f37db3fcaf2ebf2140ca442e82aee2c14e9b7b90e957e6381e25260d59552fd61df257fb3d99d0d54ab922196148f138d2eba3dba1e9a3c97b7d8ee43c7e8cebdd37cdce1a71ed70cbbdfb4a76fccc135f97be41f2b51613d34d556c04109fef7fa10cadd13074147001ea8f6dfc3200bc43d21c033ac2a06c5a6ed9cc6172a8bb0d0ff1403d20fec6bfb6c9192e90bf9a3b0617ba6ee91cd4a88de2bc2e7801f1dfa1415d8ffbc4e417206ac265b1498d3abe91ac3619c739e6fc893914b563f546d4d629015f261539b6fc5ea0ef47676342ba2759834f6620a77c623ee229107e190ea0bc966aed7af0bd2e720bc8a34f98d1cc4ff50adef5d957624992c86f4c67bbb8b4e9c3865297b64dce6b5640574aa808fb032487f65692c08f20e4634f45f6e1397f0cf6b2d0b9ca0c9a67d1b75ca475d0182580b272b647f876a6989a4a0c1fe605b149c01457f5b9241efa3b4033326fe22fc437e11bdf2cc147d0277370db5af439ddcfb8041e0b5dc1eedcdd3aba80d2862419e6c1aed66e4ce2ec22de31a6fafd62db15a892c8d21321dcf2f0a0a0a99e055140de90f4ace7da1706b73d4ed89ca682dbe2be5f0bad467582a76d82537ce5971a2f59ac4dd5c03c9eec58910ea14de24eb413a672ec85f73d360c11676f92ca6b03eb43677c42e2a345fff2b807353df0f3302312b595cc416767e31fde4eb147b5e91aec5e2b28201ca1cde0b50e9b40161bfff78fe5d3074eaed7a20fb7a6cd02c1ba06d02066f75b6049fd7c9851e9e26f62a0dc8829e24719ceedf0a0a3ba8994543f4299b5c6f95ab424eb1fb5fd8a572bb2ca323a40f7b50c581da28d95cc3f38fd179cbe27ef51f18132fa186663cab1fe1fe34bb86cd8b183126f03dd01594de17bc436d81ac48b561d4f4623580a900f413886b7d4c7d570766ae1cf52171fa4bf4aefab0d729e21654bf09bc7cb6d080c7f8858f97c4362abda0bfedff34e3e7b5e432353e7d196c38ec026881b8bacfa29924892171b417afbbcbc0b25965f2de995f87d633d002e2f499374328c0301b758fa5da4e90f8cbfc320ad11a8250485371d9ee763a803e57f1c0a2b9a647998e9b9cc42cb852aac0b24892ac163fcc6cab930500dfdb7396e931bb3a0f17e4373112ea4e39953ad3fde5c21519bc15a912882f3b039cb7ba150d8fba01cd292229783395fcef3e0f90d5fc3f9e4120699f5f9ac9ecfde703a33e39a9a9f3d6ed75630da6516192940ab26f2eb96515f2942999657ce79c53fbd970df3a5c33310db4dfadcb0d6dfb1fc6b408146a7eb7292d7bacd96ba468f49b50b4b3eaeea9b12ed6d64bde59d3d1c6af49ca4d823f3093454708d406b82001ceb51101d582b8ddde4ba67caed6591c55e79d88fe65c708a491218a44611555ec407a9710aec86992e0ccb058f60282478ef63ed18ce0037ac7d75b61f8ba5df0c1d457b8a07ee7b213ad09dab0f9e75b6697024b627d6126d416cc30ceabf383f9dbdf9f3f3f0b541b77d9081a4728e6f2b2d4450e6b901115cfade919e230e7f3407218d9bf88066138e787cb36749f3e7fe480ab23f39412a04cd9f211f295fbb79d9f51de894c14eae87853d4cf59d917abfa46622c68ad7d1ae7b13330a89a3c81e8b31705c5874486f2d7fb951fb4d363f78fa0a36021fc7d09ccd3c5396f35b78e22c6a47d402db3937dc4b78fe0852cb5d127a74defea7b7fdf390d72ce2ac9823dc5fd1e5d782ec444883695adcdcd454204652693ad7a70110bdac656dcb1116ae21386fb998839605637c6e78b6f450a5ea09374f6207061b37f38170ebe36571c78c8b0f294fb20e6ba92d3a98a3bead6bc65cb80e5f6dc187aa015363a9c70ec9ed3daebc587fb8f5e4de8ecba78fec7153e241e59cda1528a50a623ce49d5b446dea20e9aa91b24b44b6a4488c689b2adff41e2763e798cd82e458619731c48e81f4c644b0c8b3aa39eab3b83094ae5e4892cf05e7f6185900a69f0fbe22b584d7ba243b8eee496f545c156512afa3c4740c824fb4108e58b4f2181fd862007d4385c103a8d99a2d004d8b156212d81616e693e15b737bbfe6138d45c192b34354d9f507c0f8991a93c2b3440bc16675f629b451481c01ef915cf0900fe53f7e313f2a11a7690d8c0e2dbc05a683a975dbf5f663df02dfca7ec7ad17918f7383576de5250f4412862c8036591fd67ea61bfd084f94c1c21b56fa3d57e0cf4c8b4080b482fbc4ff96e623e9e349f63789030f46530269d517b9fc780fc68416859f50bd57650cf23991946e4f45a2ad82e0eb5fd70936479147620c1fd29447064c1ac4abc273861e73ec548d17bf07d6fbc36199419b87fbd9d7a8bdac248563a000005f878c6896b83bd3e360a4ebc69634a4f2cd1d1157ee985346f2aea8342a978b0abc7777c85cacf0502a9aa149be6d9a9e92d9e8c37ccbb7650a700b6ce765852b6688b0715d778e3cea27c579de2cbba372d42b93a4378ad1cf3d31b2ce7a72238ec7c553dade933018f9ff658040f6faae74955112f18934e7c2fde149eed12fabbb5e48b8771a7874a3f9e86246059d1302e4f9a30f3cce7cec36409be37fe493dd552b7623c701ac11059ee48b585b840c729c0c43eefb09e8176fe8bc97c9e917dd518632b36c606c6e1fbcdec2c45d8034e5cb127051b4b76a2a1df004af9917a1e0be71faafde80001d6304291409940b301fd7500e441688f514aa8fba190", 0x800, 0x8000}], 0x40c800, &(0x7f0000001900)={[{'wlan1\x00'}, {'#\'\"[-['}, {'nl80211\x00'}, {'\xff\xff\xff\xff\xff\xff'}, {'!#*{-\xb2*&'}], [{@seclabel}]}) [ 532.077045] nfs4: Unknown parameter 'wlan1' [ 532.099812] nfs4: Unknown parameter 'wlan1' 23:04:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:21 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:04:21 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) openat$incfs(r0, &(0x7f0000000280)='.log\x00', 0x288000, 0xb1) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8002}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xfc, 0x0, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xa6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x420}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40004000}, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x88, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xed}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3f}}]}, 0x88}, 0x1, 0x0, 0x0, 0x8890}, 0x80) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x8c, r1, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x8c}, 0x1, 0x0, 0x0, 0x2004c014}, 0x40009) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000080)=0x2) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) fcntl$lock(r2, 0x6, &(0x7f0000000000)={0x1, 0x2, 0x0, 0x401}) r3 = getpgid(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x8240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d, 0x4}, r3, 0xa, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000000080)) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r4, r4, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) 23:04:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:04:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001240)=[{&(0x7f0000001140)="097d9bf9126c0a8866b66f2678e31ed0dccb0bb909f0", 0x16}, {&(0x7f0000001180)="7fe982051510c01ea703f2e6f8d93827", 0x10, 0xfffffffffffffffa}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='@']) 23:04:21 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) socket$inet(0x2, 0x80000, 0x80000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:04:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 549.239474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 549.250001] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:04:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:21 executing program 1: msgctl$IPC_RMID(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/121) msgctl$IPC_INFO(0x0, 0x3, 0x0) r0 = msgget$private(0x0, 0x80) getpgrp(0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000140), 0x6e, 0x0, 0x0, &(0x7f0000001680)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{&(0x7f00000016c0), 0x6e, &(0x7f0000001a00)=[{&(0x7f0000001740)=""/12, 0xc}, {&(0x7f0000001780)=""/54, 0x36}, {&(0x7f00000017c0)=""/189, 0xbd}, {&(0x7f0000001880)=""/191, 0xbf}, {&(0x7f0000001940)=""/169, 0xa9}], 0x5, &(0x7f0000001a80)}}], 0x2, 0x2001, &(0x7f0000001c40)={0x0, 0x989680}) msgrcv(r0, &(0x7f0000000040)={0x0, ""/2}, 0xa, 0x2, 0x2800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1cf, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x80000000000400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) renameat2(r2, &(0x7f0000001a80)='./file0\x00', r1, &(0x7f0000001ac0)='./file0\x00', 0x0) 23:04:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:04:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 549.461020] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 549.520100] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:04:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = getpgid(0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001580)=ANY=[@ANYBLOB="240000001e00852e000000000000000000000000080000000000000008000800", @ANYRES32=r2, @ANYBLOB="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"], 0x24}}, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = getpgid(0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000400)='macsec0\x00', 0x10) ptrace(0x10, r3) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r4, r4, 0x0, 0x3) write$binfmt_elf32(r4, &(0x7f00000016c0)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0x8e, 0x3f, 0x1f, 0x7ff, 0x3, 0x3, 0x3, 0x3b0, 0x38, 0x3e0, 0x80000000, 0x0, 0x20, 0x2, 0x1ff, 0xffff, 0x5}, [{0x60000000, 0xa0000000, 0x1, 0x7, 0x1fe, 0x0, 0x80000000, 0x1}, {0x6474e551, 0x1, 0x6, 0x400, 0x7, 0x6, 0x4}], "fcfc559d96dad20f2730fe050dddb3871ec523d270002453b8e360f172", ['\x00', '\x00', '\x00']}, 0x395) clone3(&(0x7f0000001500)={0x80000000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x2f}, &(0x7f00000002c0)=""/197, 0xc5, &(0x7f0000001440)=""/134, &(0x7f00000003c0)=[r3, 0x0], 0x2, {r1}}, 0x58) socket$nl_audit(0x10, 0x3, 0x9) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregset(0x4204, 0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000440)=""/4096, 0x1000}) 23:04:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 549.648471] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:04:35 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:04:35 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6122d39b68411041cbb300"]) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) openat(r0, &(0x7f0000000080)='./file0\x00', 0xa000, 0x12) 23:04:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:04:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:35 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:04:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat2(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x600000, 0x48, 0x3}, 0x18) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r4, r4, 0x0, 0x3) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="67091c0000ffffe1ed2a5e2a", @ANYRES16, @ANYRESDEC, @ANYRESHEX=r1, @ANYBLOB, @ANYRESHEX=r2, @ANYRESDEC], 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) fcntl$lock(r2, 0x25, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000000)={0x8020}) readlinkat(r5, &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)=""/192, 0xc0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000200)='net/nfsfs\x00') ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10}) 23:04:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 563.215948] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:04:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4", 0x32, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 563.292182] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 23:04:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 563.390948] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 [ 563.398471] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:04:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x4e, 0x0, "15bb6949bc674ed64133723aa6453b9d292123bebbcd37c5097fd53da62c01e266166394afb8d0aca105da30931d140a11973acb99cc0d8da3a4f6f42444a1948f422c8d8d2d8bdd069588783e32b713"}, 0xd8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x32e}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x4205c0, 0x0) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000140)={0x2, {0x2, 0x2, 0x7, 0x3f, 0x8001, 0xf}}) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x10044001) syz_io_uring_setup(0xb76, &(0x7f0000000080)={0x0, 0x2d71, 0x10}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000580)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r5, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x20004000}, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xc, 0x10, r1, 0x10000000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x749442, 0x80) r8 = inotify_init1(0x40800) r9 = syz_open_dev$loop(&(0x7f0000000200), 0x0, 0x4203) syz_io_uring_submit(r3, r6, &(0x7f0000000280)=@IORING_OP_FILES_UPDATE={0x14, 0x4, 0x0, 0x0, 0x8, &(0x7f0000000240)=[r7, r8, r0, r9], 0x4}, 0x20) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) 23:04:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:52 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:04:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4", 0x32, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:04:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/nf_conntrack_sip', 0x0, 0x112) sendfile(r0, r0, 0x0, 0x3) pwritev(r0, &(0x7f0000000740)=[{&(0x7f0000000140)="43f176e2ed32fc8e59b945cf2ce2f3a5c893b0c9542483bc0b64d1adafdfbfd251cb", 0x22}, {&(0x7f0000000a00)="1e184a7e0bfaf077dd888ff88a0100760f5cce14c82c5239dbc3061c55ea652dfbee1d6148b81c46ce000800000000000031aa7ac54baf0e8cf24d4114b3ed1c6206323df27058acb6c2a0383be8676156b5efcb7ba4b5180a9d13fb22a4f8e6d86724caab7cc47748f6951244d8dd2e463d48ee5539f38192cf9921eb1e3c0d68a087d49c70b71bc065f58ba8906539d37ca1330c0959c953075b27e2fd77d662b659f04d68c957d476fbd8f6ebcc0f2d17acc97330e97ec41f2ef1582c688b67067bed0fbafb88919860574420154e4e4f78bb4e4c0cd3ea6f2a81a753e4cfe8a55cd294e77c3af4aeb0fe93ff450368a72680dfbc221944d9f8016936cca87d49391c9d58d2164fd638427a5f5260ab6f1998da5cd880a540843bcfd74fed2a529d7b8d74baee485ed245f9f17dcb3947047bf93f65137eacdc56df391a8eb1cce47782527eb372b3e014616bcd1a2664ce040000000000000000", 0x15c}, {&(0x7f0000000240)="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", 0xfd}, {&(0x7f00000008c0)="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", 0x11a}, {&(0x7f0000000380)="411433e2d6d7422a6396eed23f6852a56177a4cebc8de485eab055437de59c3eb13c59b6b1efbc23dea0b323a101b3a5cd8d7c7be9a559944a22906d5ba2ea7a099f1bea7c374610fa363093019d9fc23c3980d31a34c46762b20e3d16286cd858ae1ab643b379967446253eecc830fa5babd4d71c89f1a1da87d0d3d71400"/139, 0x8b}, {&(0x7f0000000440)="9826bc3e65b37522b2607a72d21f9d8b469b104b70f2874a339e2079db235c57f0f6c851a6b0bdecbe3a05224f5b36dd32364bda08507652484b1dfa8035c322e60648c79aa6b2d534603178242386ffcbb218a830c01acd06f0984ea2186520d7b88f3d6e44e80f1733a9d2936cbeb5b4cd612e52e8e9c877794d00145b703db242a8a419661fc9479a7a19588e0b7b50ba06b82daae52f4595bed45ce3428d185f0650ca6a8546438db6416f3cdfb7324ecd181c931391a365ae076bf2b6ebcb5473950aff11904def", 0xca}, {&(0x7f0000000000)="924b718f0e11a4f9975e9707ae5e44b9061cb2689db688eea0f2b5e438d3be003dae1c75235189c6765fb79bbd69526cbb338fd28bccfc9247d6e7d5fd6bc417646c18bbd9a7e61c37f7e7b459eccf789c87b014b48148ffbea269675c06f54167cb400e60085906158a81c498063c2e8dffc639bcd16b36382137ffbdffa9381058de608e5936c99ab80bf678aa79a7204be9c7f483f93b30c2f4cd112b9b7f4a522396f4aa9d5de31e76f2f6908e26836bf871341b6bd5784f4140aa65d3fae31df3c86d787ea83fbbc0286ef372a8fe3ba5497bdecce283d24d389baee01906aa9d4f41041fe6a0", 0xe9}, {&(0x7f00000007c0)="f9cb389bf7f4befbfe584953eb715b342907314c6ff10b770d68a778e1d653bab0856b6f29fb9d16f186ccbeac383e3cd16d2e8a247a37563759446c748aa30b27b5b95a3eefea752bd54046e955006bbe5e6b051289c10c4e7471562691f97843580daf926d0b34a655df2c2d322e18475b896f3ad8c031e7cfb50d67215578a4722f6219c0795ac4a4bbd39c8ad1a60384cf6d28e9aa9b10d85a5cd713a908d3951301a5dbf1051cccbfe93fbc6a6b71eb7d9944ac9185d840f3ecc37af692ee8a06bedba143195e45504e1ad0ddb1f718e0ea5d609d2fbd0e24bb4bcb978c5da4e508be0604fa11", 0xe9}], 0x8, 0x0, 0x0) 23:04:52 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) 23:04:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat2(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x600000, 0x48, 0x3}, 0x18) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r4, r4, 0x0, 0x3) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="67091c0000ffffe1ed2a5e2a", @ANYRES16, @ANYRESDEC, @ANYRESHEX=r1, @ANYBLOB, @ANYRESHEX=r2, @ANYRESDEC], 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) fcntl$lock(r2, 0x25, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000000)={0x8020}) readlinkat(r5, &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)=""/192, 0xc0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000200)='net/nfsfs\x00') ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10}) 23:04:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 580.339919] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 580.356964] 9pnet: Insufficient options for proto=fd 23:04:52 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) 23:04:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 580.447679] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 23:04:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) sendmmsg$inet(r0, &(0x7f0000002040)=[{{&(0x7f0000000080)={0x2, 0xfffc, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f0000000000)="db9c836ef76a33d53b3f9614380598d074b0bf2bea428ca947a3cf721806867e1e15ac576ead402ea7b81c3da27311716717074482d365c1c98b1880b3adc06aec6f4830ac1d6f9a7df541ac4ff09234752372e56f71b0aae3c0ef68f54e1e378d390762215b3a6fe2d5e15da2a87f45f16a31582fe753f55db2", 0x7a}], 0x1, &(0x7f0000000180)=ANY=[], 0x38}}], 0x1, 0x20050050) 23:04:52 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4", 0x32, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:04:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:52 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 580.648002] 9pnet: Insufficient options for proto=fd 23:04:52 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:52 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="c1190ca63be63b9c4b2fb7f4f4b4250082a9302f5cb3fa817c74173093baf3ebc695a586b504", 0x26}, {&(0x7f0000000300)="41fd50e9fef3cbcd325b95681038a64677c0f0b366738b536fe9ecf7935020ced9d09139c069f30a88ad08e34eb500cdcc17c647e42ec24978cfe6687b3d1c0e9caa8e98a3af0baaf6e814e7effa26d3e95e349ccd510f6e5a12444a6462fa1b14f6b641cdd1c716aeb505bdfd655bbf386b6c763fa2021984ac0a5f85260287418f6ca9ca2af29ad71f882a820edef9f7f44a7d02f0ca628bd56050eac46a4aa0cf6f0527b7922a9b6790649efd057f1912469c58674bb7a11c22fb7d6c6935443cd0b4d713091e99cca66850cdbae68f9d24e41c165c", 0xd7}, {&(0x7f00000001c0)="52305c285f3a538f052d04ce8182", 0xe}, {&(0x7f0000000400)="b661e08a499eecc2e7faa192357bc82d7e57e9afae42c288cc151fa6d314b4c87bef7ff5bf1f81def2fc2dad3e1bd37286df0b71e7edf46eac14b2ce035639f4dc3aef3233a8f79415203a44ebe4d647b6d545df20538b68cf9ba790d80157b7962da0f95a20cb3bbeb356bb3500fb20b74adb2c5c311c47f8241804d5f8241f96581e24db910b970f2ca069239af5dbe8c3ff23a0de7a0be934bee8c0417c40fa6dc0a4", 0xa4}], 0x4, 0x11) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) 23:04:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 580.770281] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:04:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:04:53 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa31f52699464f38000000000006907864010300ac1414aa9404000500"/70], 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000100)={@val={0x0, 0x805}, @val={0x3, 0x3, 0x9, 0x8, 0x800, 0x1000}, @ipv6=@gre_packet={0xb, 0x6, "511f08", 0x274, 0x2f, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, {[@srh={0x0, 0xa, 0x4, 0x5, 0x20, 0xc8, 0x8000, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @private=0xa010102}, @private2={0xfc, 0x2, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x26}}, @mcast2]}], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x9f, 0x0, [0x7, 0x101], "f6a44b033ec75083566b2aab0e53ba5399684a279d71b3f68f341b5b7d1dfbf03abeb879956e631065510cb9039b231a5d142688b6469315e0ec1e7d908f1326079ed1cbd5a787f59f014d1a9f71d02feccb67a182ae0d38286fc1e2588787c329a6f41c1186f3a2cd6ba1f62b4b36b3f573f786c155b0537ce997bc981e8bfec3f11fc55bf3f3faf70663e006a72815c9ec2b4e00aa3839beb77ed84bfaa9"}, {0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, [], "2f1156db41181204f3b987688153d49f467b945ab03681cd368d30720e91435f79d38d764e6943972deb76f6ec00a650db4f74d7477e830eea63d511698ba29a89ce5b6b3ca4eec1fbbc56de389d900b051a74989620183448abbb8f7859a09593d64ed1d05784ecb76557d508e1df09c7d1133bc744b337ecafcbc451a8042c64850190129df7a4385f6659946c6f4132076a1a9edba6a5811dd81e5bd99fe5ee0597e0291c75eeca383364a4d3a7a6fa94"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x8b5e], "f46866a043e8a749e5f6eeb058d24f786a90a9e617488dd592c77fd498a0936c5dd7d11e2cb8d7"}, {0x8, 0x88be, 0x0, {{0x6, 0x1, 0xd9, 0x3, 0x0, 0x3, 0x6, 0x40}, 0x1, {0x93d}}}, {0x8, 0x22eb, 0x4, {{0x8, 0x2, 0x4, 0x1, 0x1, 0x0, 0x4, 0x8}, 0x2, {0xdc7, 0x3, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}}, {0x8, 0x6558, 0x4, "57afe1c1438a5554b5df1c8690712c08ca341aeb5a401648c9a976428c6e1b32792144c439fa496d6b8bb879958a3908d6a779a0cb59f4e341b85e26400e44bc30a19b178395a051017bd4e1f13f6dd051bab2860f1b13812b90"}}}}}, 0x2aa) [ 580.837795] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 580.880923] 9pnet: Insufficient options for proto=fd 23:05:09 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:05:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef010001000000daf4655f00000000000000", 0x4b, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:05:09 executing program 4: pipe2(&(0x7f00000000c0), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:05:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:09 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000004c0)={0x9000000a}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xf}, 0x240, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001500)={r1, 0x7, 0x4ced, 0x7ff}) mkdirat(r3, &(0x7f0000001540)='./file1\x00', 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) listen(r2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ppoll(&(0x7f0000000240)=[{r2}, {r4, 0x82}, {r0, 0x8109}, {0xffffffffffffffff, 0x4}, {r0, 0x10090}], 0x5, &(0x7f00000002c0), &(0x7f0000000440)={[0xb9]}, 0x8) clone3(&(0x7f0000000080)={0x1040900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r5, r5, 0x0, 0x3) sendmsg$sock(r5, &(0x7f0000000480)={&(0x7f0000000300)=@ieee802154={0x24, @long={0x3, 0x3, {0xaaaaaaaaaaaa0102}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000380)="796b83126992dc9ce8068588db9026774013338f3b256f0655a2e06e21b70e9224b5ab2fa3a9de2f810587b5f178cd2b4dcd8594fb3c1301981997450c526386e964c56d1589886af255", 0x4a}], 0x2, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x7f}}], 0x30}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000001580)={0x3, 0x0, 0x4, 0xfffffffffffffffe, 0xfffffffd}) 23:05:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 597.316174] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 597.321252] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:05:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 23:05:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:05:09 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:05:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) [ 597.548966] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 597.586269] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 3 (only 16 groups) 23:05:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:05:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:24 executing program 4: pipe2(&(0x7f00000000c0), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:05:24 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:05:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:24 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 23:05:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 612.150353] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:05:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:05:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:24 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:05:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000380)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@uname={'uname', 0x3d, '{'}}], [{@obj_type={'obj_type', 0x3d, '{{^$'}}, {@uid_gt={'uid>', r1}}, {@euid_lt={'euid<', r1}}, {@hash}, {@permit_directio}, {@appraise}, {@appraise}, {@obj_type={'obj_type', 0x3d, '@&[&'}}]}}) open$dir(&(0x7f0000000100)='./file1\x00', 0x20000, 0x82) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001740)={&(0x7f00000017c0)={0x1724, 0x22, 0x1, 0x70bd29, 0x25dfdbfe, {0x13}, [@nested={0x1352, 0x25, 0x0, 0x1, [@generic="7c467eb4f7bbdc68300fede4bfba6ff8c01ce936439d931bfa2c4936c09e43ab2ad0d638f0bb192dcf3925f9ff56a386ccb905370388f0c337e4fd8ebed5b8b87ee2fc673a74642cf35cac19ac11d783230b356abc2844922cb04605828a0bd7ccb3985ebe6b6506f3b6e2e3d6c5886afc70f8b2f3613dfe76795cc6299c2b648e52b47ab78ada8c5aac012954ed9628b3bd72f4e9585e200259186d0c11830bf7e98a8690bb25bedbd1349186cc11e45db7167091230dc1c171ebec694b9cbf72f1849c9109d1cacc099e11b8c7243f03c561732124", @generic="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", @generic="8149690208610b01ae7c5510830419b0a339259a86b7d39f32044f41de5d04a75d591bd69fedb143139c66fc74fce52f2c208fa24a6351caf182afb513139b77bc5dd694ac8a72c9ee309649902846246faeaff2e00ea47388bc94a2db10a6188d201449ce13455df3675b3ceb616ec31d6c1de6d5b4ed04eb3e9ef01e77eac678ec82e7a4cba0a54d07d572c816d4a34be3d9ac03", @generic="d65df964bab268b1ca409578d1a6984ecfa84335584dfda3fa06342d5394470530a98dbdf2272111494f5cb59e3c873a397d99ab9ab90bf504dab00f5827571339229a54d0059d227be0f4b3dd4d0fcc4b37d8d972c3f143b7e30549e25162c31a09d225afab0d415709ba93a17fa2052a1090077b98f38ca26ed6a214", @typed={0x8, 0x28, 0x0, 0x0, @uid=r1}, @generic="273ac21125a4d557d5f685716273a89691091774e526fcc7fa595281c9b3a2be05d3f6a35bb571ca20aa5baec961de370fa8b2f2ba61b51c182aee9c096031859ef9a66262cc2f891919eda670ea69c496d3e706aed9231705efd457ffc7204190e63feae1c4141e353b49c4b8c365a6bbcf9e77f37f54661cb4fd0e61216700e4ce800807e172da0c7c94ef3c0dc6482b5e60a210d224b49a8643534fad0de2ff6688608a292025121e20b77b66918bc7c69352e471c1a51be897b481dc3db5592faf367b318b6000c1e07014904b16f0", @generic="441c4c68793a0bb967539dd51631110d084d9168f5a61f4241684f372ec642699038be4913b78c813241d78dbe09a469601dc244babd41c7a2faa0cb08bbf23a9af5941dd3daa66daceb183458e870cef2f4c9105b791ad0b8e25c77de3ccc4cad0962257051160e900ca11f2f2c780c5c7daa6e63ebbd780cd9380099054926bee60de7519fe39e85184ca8ec"]}, @generic="d0c799a15c0cbe7212ce001bb2e7e7a4aed28c73f05dee91d3952966e9556b41b35f9ab98f58ea805d730e86176027e52b86f817f8c3a505b39ba3f50ac9c33e8024c92381454b09fcb77e8aa5ffd4d11f0ac5bfb4", @generic="05a2b6722208cd56ee77605eeb2bf992403c6fb65d339d01e84d7f008a31dfd4c62c4c6b8089e06119de915967a78314e15ae6113267609c04a48f8e3f514852e206458da3cbe793300c4bd74b", @typed={0x14, 0x88, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x69, 0x2c, 0x0, 0x1, [@typed={0x8, 0x79, 0x0, 0x0, @u32=0x9}, @generic="0e76246923d4e7a848e58139475ba8f69beebedfe8c941a9afb5f16a62c8592acb3743ad3f2046f570a7e664ba18ea8aa1ba1f8db389d9b854573a9e24ed0b27c72afa2a0c5057958dda5e1bffd2478dbdded15b0220f72ecc84a0aa91"]}, @generic, @nested={0x293, 0x7a, 0x0, 0x1, [@generic="0fa29035abd9ee1d97047cc181aaf6fee5e21709137f992d16166c7d0471a7e6be5e122f634106c95326d7462c10b30e1f2a2a645ef48b7d218bcb5f3921c50fda65dc8ae7370d1599c7b2c5a77af842ddf2a867a851046a3d25b307f8b6cd62d6ed83dd008c87e3227bfdbe2a1553a989818a42679779a23377bea0a62a02d58b71d8dc5e3f51e23ede4a5b35eca0809c50cde27491be2ba4ebd0691cbfd2bb7c51b78cb95b03aeebb275b9f7906e5f831c20ffb675884b4d19150e2ca782166b93d93d4d0a2902e7aa42dcf8d7ecc4310e670ba5e8e1c228224a", @typed={0xc, 0x4e, 0x0, 0x0, @u64=0xc8c}, @generic="6eddfd225023a6d9e01e540073d584b38fd9cd27d4ea94a2341b92d4351ebfae27a98254c5a759b26a3016527190a041eed57c254e9a48c8fd5321b2443459aebc01c036d62f303d7b4288df704dc8ae8214e5bc689a0438ecf34564a7bd27d229818f9bd3b10aa3917503289ec2655e38f471a40883f4e32588d818c193228b98742b062f3d564584ca15188db40775ad84d5a7d3e95990aa5ba28f7782d615a3b7b0256b9d4dbe682abc4fca31d904f850f756eca43cd752300621646149bca200df9b61483b8e7d5d4d28", @typed={0x14, 0x87, 0x0, 0x0, @ipv6=@local}, @generic="05973e9786e7abe5bc7a082693c7023e688329c0e623b29f7bbf8a44ada10c7c9256fa650106b16e2d7778e212cfc3251add8662ac56a73ecbffd8984343e6ad2a3f0dc860cffa141d44917a06ef347c5fd7d8df3bdb325c0c19fe94508e1d227938ba9b6cfb25d3badb75a6e4fc25684002122b0abf22b765a3b3d1e80d5272a7abd0c843aa4fca06e40f38bdd9d7c440b760b708d55a7eb86bb68765131ffa2784a47d684c730bd21f99616029f980ff80f234bafbb531d083642e8cb0dbc9", @typed={0x8, 0x59, 0x0, 0x0, @fd=r0}]}, @typed={0x4, 0x29}]}, 0x1724}, 0x1, 0x0, 0x0, 0x20000081}, 0x20000000) [ 612.347170] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:05:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:40 executing program 4: pipe2(&(0x7f00000000c0), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:05:40 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 1) 23:05:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100ce000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696c653200f6b4371714babfd2ed47a21d9195266cd890f031"]) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@private=0xa010100, @empty, 0x1, 0x5, [@dev={0xac, 0x14, 0x14, 0x31}, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, @rand_addr=0x64010101, @broadcast]}, 0x24) openat(r1, &(0x7f0000000280)='./file1\x00', 0x701f02, 0x2c) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000003700)={0x0, 0x989680}) mkdirat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) ioctl$BTRFS_IOC_QUOTA_RESCAN(r3, 0x4040942c, &(0x7f0000000040)={0x0, 0x1f9, [0x0, 0xc8a2, 0x0, 0x8000, 0x101, 0x4]}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup2(r5, r4) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e22, @private=0xa010100}, 0x10) unshare(0x48020200) 23:05:40 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef0100010000", 0x3f, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:05:40 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 628.470185] FAULT_INJECTION: forcing a failure. [ 628.470185] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 628.472570] CPU: 0 PID: 6125 Comm: syz-executor.7 Not tainted 5.10.200 #1 [ 628.473939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 628.475631] Call Trace: [ 628.476159] dump_stack+0x107/0x167 [ 628.476896] should_fail.cold+0x5/0xa [ 628.477669] _copy_from_user+0x2e/0x1b0 [ 628.478481] move_addr_to_kernel.part.0+0x31/0x110 [ 628.479498] __sys_connect+0xda/0x1a0 [ 628.480265] ? __sys_connect_file+0x1a0/0x1a0 [ 628.481157] ? perf_trace_preemptirq_template+0x26d/0x400 [ 628.482245] ? perf_trace_preemptirq_template+0x26d/0x400 [ 628.483361] ? __traceiter_irq_enable+0xc0/0xc0 [ 628.484286] ? __traceiter_irq_enable+0xc0/0xc0 [ 628.485222] ? fput_many+0x2f/0x1a0 [ 628.485953] ? trace_rcu_dyntick+0x2f/0x170 [ 628.486828] __x64_sys_connect+0x6f/0xb0 [ 628.487649] ? syscall_enter_from_user_mode+0x1d/0x50 [ 628.488687] do_syscall_64+0x33/0x40 [ 628.489437] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 628.490463] RIP: 0033:0x7f22a122eb19 [ 628.491225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 628.494912] RSP: 002b:00007f229e7a4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 628.496437] RAX: ffffffffffffffda RBX: 00007f22a1341f60 RCX: 00007f22a122eb19 [ 628.497865] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 628.499307] RBP: 00007f229e7a41d0 R08: 0000000000000000 R09: 0000000000000000 [ 628.500735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 628.502161] R13: 00007ffd0a40370f R14: 00007f229e7a4300 R15: 0000000000022000 [ 628.522775] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:05:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:40 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:40 executing program 4: pipe2(&(0x7f00000000c0), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 628.656314] 9pnet: Insufficient options for proto=fd 23:05:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:40 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 2) 23:05:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:05:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:40 executing program 4: pipe2(&(0x7f00000000c0), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 23:05:40 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 628.727713] FAULT_INJECTION: forcing a failure. [ 628.727713] name failslab, interval 1, probability 0, space 0, times 1 [ 628.728932] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 628.730246] CPU: 1 PID: 6149 Comm: syz-executor.7 Not tainted 5.10.200 #1 [ 628.732799] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 628.734453] Call Trace: [ 628.734993] dump_stack+0x107/0x167 [ 628.735728] should_fail.cold+0x5/0xa [ 628.736493] ? __inet_hash_connect+0x674/0xd50 [ 628.737409] should_failslab+0x5/0x20 [ 628.738169] kmem_cache_alloc+0x5b/0x310 [ 628.739010] __inet_hash_connect+0x674/0xd50 [ 628.739899] ? __inet6_lookup_established+0xa90/0xa90 [ 628.740937] ? inet_hash+0x80/0x80 [ 628.741667] tcp_v6_connect+0x1191/0x1c40 [ 628.742507] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 628.743439] ? mark_lock+0xf5/0x2df0 [ 628.744210] __inet_stream_connect+0x8d8/0xe70 [ 628.745122] ? lock_release+0x680/0x680 [ 628.745915] ? __traceiter_irq_enable+0xc0/0xc0 [ 628.746842] ? inet_init_net+0x590/0x590 [ 628.747673] ? mark_held_locks+0x9e/0xe0 [ 628.748488] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 628.749528] ? __local_bh_enable_ip+0x9d/0x100 [ 628.750438] inet_stream_connect+0x53/0xa0 [ 628.751288] ? __inet_stream_connect+0xe70/0xe70 [ 628.752235] __sys_connect_file+0x15b/0x1a0 [ 628.753106] __sys_connect+0x165/0x1a0 [ 628.753887] ? __sys_connect_file+0x1a0/0x1a0 [ 628.754794] ? __traceiter_irq_enable+0xc0/0xc0 [ 628.755730] ? __traceiter_irq_enable+0xc0/0xc0 [ 628.756653] ? fput_many+0x2f/0x1a0 [ 628.757385] ? trace_rcu_dyntick+0x2f/0x170 [ 628.758252] __x64_sys_connect+0x6f/0xb0 [ 628.759081] ? syscall_enter_from_user_mode+0x1d/0x50 [ 628.760112] do_syscall_64+0x33/0x40 [ 628.760861] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 628.761877] RIP: 0033:0x7f22a122eb19 [ 628.762620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 628.766273] RSP: 002b:00007f229e7a4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 628.767803] RAX: ffffffffffffffda RBX: 00007f22a1341f60 RCX: 00007f22a122eb19 [ 628.769224] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 628.770643] RBP: 00007f229e7a41d0 R08: 0000000000000000 R09: 0000000000000000 [ 628.772064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 628.773486] R13: 00007ffd0a40370f R14: 00007f229e7a4300 R15: 0000000000022000 [ 628.841270] 9pnet: Insufficient options for proto=fd 23:05:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:41 executing program 4: pipe2(&(0x7f00000000c0), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 629.075407] 9pnet: Insufficient options for proto=fd 23:05:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) 23:05:57 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:05:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:57 executing program 4: pipe2(&(0x7f00000000c0), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:05:57 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 3) 23:05:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:05:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x200000a, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_complete(r1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 645.558552] FAULT_INJECTION: forcing a failure. [ 645.558552] name failslab, interval 1, probability 0, space 0, times 0 [ 645.560869] CPU: 1 PID: 6180 Comm: syz-executor.7 Not tainted 5.10.200 #1 [ 645.562223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 645.563887] Call Trace: [ 645.564418] dump_stack+0x107/0x167 [ 645.565145] should_fail.cold+0x5/0xa [ 645.565896] ? create_object.isra.0+0x3a/0xa20 [ 645.566799] should_failslab+0x5/0x20 [ 645.567557] kmem_cache_alloc+0x5b/0x310 [ 645.568351] ? lock_release+0x680/0x680 [ 645.569139] create_object.isra.0+0x3a/0xa20 [ 645.570002] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 645.571000] kmem_cache_alloc+0x159/0x310 [ 645.571876] __inet_hash_connect+0x674/0xd50 [ 645.572752] ? __inet6_lookup_established+0xa90/0xa90 [ 645.573760] ? inet_hash+0x80/0x80 [ 645.574472] tcp_v6_connect+0x1191/0x1c40 [ 645.575318] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 645.576221] ? mark_lock+0xf5/0x2df0 [ 645.576970] __inet_stream_connect+0x8d8/0xe70 [ 645.577863] ? lock_release+0x680/0x680 [ 645.578640] ? __traceiter_irq_enable+0xc0/0xc0 [ 645.579545] ? inet_init_net+0x590/0x590 [ 645.580333] ? mark_held_locks+0x9e/0xe0 [ 645.581119] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 645.582125] ? __local_bh_enable_ip+0x9d/0x100 [ 645.583006] inet_stream_connect+0x53/0xa0 [ 645.583825] ? __inet_stream_connect+0xe70/0xe70 [ 645.584736] __sys_connect_file+0x15b/0x1a0 [ 645.585569] __sys_connect+0x165/0x1a0 [ 645.586316] ? __sys_connect_file+0x1a0/0x1a0 [ 645.587204] ? __traceiter_irq_enable+0xc0/0xc0 [ 645.588096] ? __traceiter_irq_enable+0xc0/0xc0 [ 645.588990] ? fput_many+0x2f/0x1a0 [ 645.589698] ? trace_rcu_dyntick+0x2f/0x170 [ 645.590540] __x64_sys_connect+0x6f/0xb0 [ 645.591326] ? syscall_enter_from_user_mode+0x1d/0x50 [ 645.592322] do_syscall_64+0x33/0x40 [ 645.593042] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 645.594030] RIP: 0033:0x7f22a122eb19 [ 645.594749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 645.598286] RSP: 002b:00007f229e7a4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 645.599764] RAX: ffffffffffffffda RBX: 00007f22a1341f60 RCX: 00007f22a122eb19 [ 645.601133] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 645.602503] RBP: 00007f229e7a41d0 R08: 0000000000000000 R09: 0000000000000000 [ 645.603876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 645.605238] R13: 00007ffd0a40370f R14: 00007f229e7a4300 R15: 0000000000022000 [ 645.635177] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:05:57 executing program 4: pipe2(&(0x7f00000000c0), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:05:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) 23:05:57 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:05:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:05:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 4) [ 645.838240] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 645.844352] FAULT_INJECTION: forcing a failure. [ 645.844352] name failslab, interval 1, probability 0, space 0, times 0 [ 645.846535] CPU: 1 PID: 6203 Comm: syz-executor.7 Not tainted 5.10.200 #1 [ 645.847709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 645.849079] Call Trace: [ 645.849529] dump_stack+0x107/0x167 [ 645.850147] should_fail.cold+0x5/0xa [ 645.850787] ? __alloc_skb+0x6d/0x5b0 [ 645.851433] should_failslab+0x5/0x20 [ 645.852060] kmem_cache_alloc_node+0x55/0x330 [ 645.852795] ? lock_downgrade+0x6d0/0x6d0 [ 645.853482] __alloc_skb+0x6d/0x5b0 [ 645.854094] ? tcp_write_queue_purge+0x5a8/0x14b0 [ 645.854887] sk_stream_alloc_skb+0x109/0xc30 [ 645.855633] tcp_connect+0xef2/0x4550 [ 645.856298] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 645.857091] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 645.857861] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 645.858707] tcp_v6_connect+0x1419/0x1c40 [ 645.859447] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 645.860227] ? mark_lock+0xf5/0x2df0 [ 645.860880] __inet_stream_connect+0x8d8/0xe70 [ 645.861655] ? lock_release+0x680/0x680 [ 645.862332] ? __traceiter_irq_enable+0xc0/0xc0 [ 645.863131] ? inet_init_net+0x590/0x590 [ 645.863831] ? mark_held_locks+0x9e/0xe0 [ 645.864528] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 645.865408] ? __local_bh_enable_ip+0x9d/0x100 [ 645.866180] inet_stream_connect+0x53/0xa0 [ 645.866896] ? __inet_stream_connect+0xe70/0xe70 [ 645.867677] __sys_connect_file+0x15b/0x1a0 [ 645.868402] __sys_connect+0x165/0x1a0 [ 645.869068] ? __sys_connect_file+0x1a0/0x1a0 [ 645.869834] ? __traceiter_irq_enable+0xc0/0xc0 [ 645.870617] ? __traceiter_irq_enable+0xc0/0xc0 [ 645.871421] ? fput_many+0x2f/0x1a0 [ 645.872043] ? trace_rcu_dyntick+0x2f/0x170 [ 645.872778] __x64_sys_connect+0x6f/0xb0 [ 645.873465] ? syscall_enter_from_user_mode+0x1d/0x50 [ 645.874348] do_syscall_64+0x33/0x40 [ 645.874964] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 645.875846] RIP: 0033:0x7f22a122eb19 [ 645.876464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 645.879615] RSP: 002b:00007f229e7a4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 645.880903] RAX: ffffffffffffffda RBX: 00007f22a1341f60 RCX: 00007f22a122eb19 [ 645.882102] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 645.883342] RBP: 00007f229e7a41d0 R08: 0000000000000000 R09: 0000000000000000 [ 645.884536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 645.885775] R13: 00007ffd0a40370f R14: 00007f229e7a4300 R15: 0000000000022000 23:06:14 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 5) 23:06:14 executing program 4: pipe2(&(0x7f00000000c0), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:06:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) 23:06:14 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:14 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 662.645278] FAULT_INJECTION: forcing a failure. [ 662.645278] name failslab, interval 1, probability 0, space 0, times 0 [ 662.647744] CPU: 0 PID: 6217 Comm: syz-executor.7 Not tainted 5.10.200 #1 [ 662.649207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 662.651006] Call Trace: 23:06:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:06:14 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) syz_io_uring_setup(0x685f, &(0x7f0000000000)={0x0, 0x65ea, 0x4, 0x3, 0xbe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') syz_io_uring_setup(0xb76, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000580)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r4, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x20004000}, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r5, r5, 0x0, 0x3) syz_io_uring_setup(0x457f, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x3, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000180)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, {0x0, r7}}, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001600)={&(0x7f00000002c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/218, 0xda}, {&(0x7f0000001440)=""/150, 0x96}], 0x3, &(0x7f0000001500)=""/242, 0xf2}, 0x0, 0x100, 0x0, {0x2, r7}}, 0x7) syz_io_uring_submit(r0, r3, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r5, 0x0, &(0x7f0000000180)='./file0\x00', 0xa4, 0x1, 0x12345, {0x0, r7}}, 0xfffffff9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000001940)=[{&(0x7f0000000240)}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/232, 0xe8}, {&(0x7f0000000600)=""/254, 0xfe}, {&(0x7f0000000700)=""/134, 0x86}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x7) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0000239c9a29b54d19a456d42f20a9e86912dddc3d9600"]) syz_io_uring_setup(0x7f02, &(0x7f0000000240)={0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 662.651607] dump_stack+0x107/0x167 [ 662.652518] should_fail.cold+0x5/0xa [ 662.653349] ? create_object.isra.0+0x3a/0xa20 [ 662.654342] should_failslab+0x5/0x20 [ 662.655171] kmem_cache_alloc+0x5b/0x310 [ 662.656077] create_object.isra.0+0x3a/0xa20 [ 662.657043] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 662.658157] kmem_cache_alloc_node+0x169/0x330 [ 662.659156] ? lock_downgrade+0x6d0/0x6d0 [ 662.660092] __alloc_skb+0x6d/0x5b0 [ 662.660891] ? tcp_write_queue_purge+0x5a8/0x14b0 [ 662.661948] sk_stream_alloc_skb+0x109/0xc30 [ 662.662923] tcp_connect+0xef2/0x4550 [ 662.663792] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 662.664810] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 662.665820] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 662.666914] tcp_v6_connect+0x1419/0x1c40 [ 662.667849] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 662.668855] ? mark_lock+0xf5/0x2df0 [ 662.669696] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 662.670811] __inet_stream_connect+0x8d8/0xe70 [ 662.671863] ? __traceiter_irq_enable+0xc0/0xc0 [ 662.672902] ? inet_init_net+0x590/0x590 [ 662.673820] ? mark_held_locks+0x9e/0xe0 [ 662.674734] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 662.675924] ? __local_bh_enable_ip+0x9d/0x100 [ 662.676945] inet_stream_connect+0x53/0xa0 [ 662.677900] ? __inet_stream_connect+0xe70/0xe70 [ 662.678966] __sys_connect_file+0x15b/0x1a0 [ 662.679958] __sys_connect+0x165/0x1a0 [ 662.680836] ? __sys_connect_file+0x1a0/0x1a0 [ 662.681852] ? __traceiter_irq_enable+0xc0/0xc0 [ 662.682893] ? __traceiter_irq_enable+0xc0/0xc0 [ 662.683946] ? fput_many+0x2f/0x1a0 [ 662.684763] ? trace_rcu_dyntick+0x2f/0x170 [ 662.685721] __x64_sys_connect+0x6f/0xb0 [ 662.686612] ? syscall_enter_from_user_mode+0x1d/0x50 [ 662.687752] do_syscall_64+0x33/0x40 [ 662.688572] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 662.689692] RIP: 0033:0x7f22a122eb19 [ 662.690513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 662.694585] RSP: 002b:00007f229e7a4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 662.696285] RAX: ffffffffffffffda RBX: 00007f22a1341f60 RCX: 00007f22a122eb19 [ 662.697874] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 662.699469] RBP: 00007f229e7a41d0 R08: 0000000000000000 R09: 0000000000000000 [ 662.701064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 662.702665] R13: 00007ffd0a40370f R14: 00007f229e7a4300 R15: 0000000000022000 23:06:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:06:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 662.785576] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:06:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 6) 23:06:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:15 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:06:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:06:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:06:15 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 663.054120] FAULT_INJECTION: forcing a failure. [ 663.054120] name failslab, interval 1, probability 0, space 0, times 0 [ 663.056575] CPU: 1 PID: 6252 Comm: syz-executor.7 Not tainted 5.10.200 #1 [ 663.057955] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 663.059633] Call Trace: [ 663.060180] dump_stack+0x107/0x167 [ 663.060943] should_fail.cold+0x5/0xa [ 663.061743] should_failslab+0x5/0x20 [ 663.062526] __kmalloc_node_track_caller+0x74/0x3b0 [ 663.063540] ? sk_stream_alloc_skb+0x109/0xc30 [ 663.064467] ? lock_downgrade+0x6d0/0x6d0 [ 663.065313] __alloc_skb+0xb1/0x5b0 [ 663.066008] sk_stream_alloc_skb+0x109/0xc30 [ 663.066878] tcp_connect+0xef2/0x4550 [ 663.067694] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 663.068641] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 663.069563] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 663.070582] tcp_v6_connect+0x1419/0x1c40 [ 663.071444] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 663.072381] ? mark_lock+0xf5/0x2df0 [ 663.073160] __inet_stream_connect+0x8d8/0xe70 [ 663.074105] ? lock_release+0x680/0x680 [ 663.074931] ? __traceiter_irq_enable+0xc0/0xc0 [ 663.075893] ? inet_init_net+0x590/0x590 [ 663.076744] ? mark_held_locks+0x9e/0xe0 [ 663.077576] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 663.078639] ? __local_bh_enable_ip+0x9d/0x100 [ 663.079586] inet_stream_connect+0x53/0xa0 [ 663.080443] ? __inet_stream_connect+0xe70/0xe70 [ 663.081406] __sys_connect_file+0x15b/0x1a0 [ 663.082288] __sys_connect+0x165/0x1a0 [ 663.083083] ? __sys_connect_file+0x1a0/0x1a0 [ 663.084004] ? __traceiter_irq_enable+0xc0/0xc0 [ 663.084943] ? __traceiter_irq_enable+0xc0/0xc0 [ 663.085897] ? fput_many+0x2f/0x1a0 [ 663.086645] ? trace_rcu_dyntick+0x2f/0x170 [ 663.087544] __x64_sys_connect+0x6f/0xb0 [ 663.088373] ? syscall_enter_from_user_mode+0x1d/0x50 [ 663.089425] do_syscall_64+0x33/0x40 [ 663.090187] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 663.091228] RIP: 0033:0x7f22a122eb19 [ 663.091997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 663.095784] RSP: 002b:00007f229e7a4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 663.097363] RAX: ffffffffffffffda RBX: 00007f22a1341f60 RCX: 00007f22a122eb19 [ 663.098841] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 663.100287] RBP: 00007f229e7a41d0 R08: 0000000000000000 R09: 0000000000000000 [ 663.101735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 663.103186] R13: 00007ffd0a40370f R14: 00007f229e7a4300 R15: 0000000000022000 23:06:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:06:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:06:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:15 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 663.347918] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 678.194862] FAULT_INJECTION: forcing a failure. [ 678.194862] name failslab, interval 1, probability 0, space 0, times 0 [ 678.197089] CPU: 1 PID: 6283 Comm: syz-executor.7 Not tainted 5.10.200 #1 [ 678.198375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 678.199973] Call Trace: [ 678.200477] dump_stack+0x107/0x167 [ 678.201191] should_fail.cold+0x5/0xa [ 678.201922] ? create_object.isra.0+0x3a/0xa20 [ 678.202802] should_failslab+0x5/0x20 [ 678.203549] kmem_cache_alloc+0x5b/0x310 [ 678.204323] create_object.isra.0+0x3a/0xa20 [ 678.205161] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 678.206130] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 678.207098] ? sk_stream_alloc_skb+0x109/0xc30 [ 678.207959] __alloc_skb+0xb1/0x5b0 [ 678.208629] sk_stream_alloc_skb+0x109/0xc30 [ 678.209493] tcp_connect+0xef2/0x4550 [ 678.210210] ? __tcp_transmit_skb+0x35c0/0x35c0 23:06:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 7) 23:06:30 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:06:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:06:30 executing program 0: pipe2(&(0x7f00000000c0), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:06:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:06:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 678.211352] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 678.212328] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 678.213304] tcp_v6_connect+0x1419/0x1c40 [ 678.214083] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 678.214931] ? mark_lock+0xf5/0x2df0 [ 678.215653] __inet_stream_connect+0x8d8/0xe70 [ 678.216494] ? lock_release+0x680/0x680 [ 678.217227] ? __traceiter_irq_enable+0xc0/0xc0 [ 678.218075] ? inet_init_net+0x590/0x590 [ 678.218828] ? mark_held_locks+0x9e/0xe0 [ 678.219591] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 678.220562] ? __local_bh_enable_ip+0x9d/0x100 [ 678.221402] inet_stream_connect+0x53/0xa0 [ 678.222194] ? __inet_stream_connect+0xe70/0xe70 [ 678.223106] __sys_connect_file+0x15b/0x1a0 [ 678.223944] __sys_connect+0x165/0x1a0 [ 678.224691] ? __sys_connect_file+0x1a0/0x1a0 [ 678.225551] ? __traceiter_irq_enable+0xc0/0xc0 [ 678.226426] ? __traceiter_irq_enable+0xc0/0xc0 [ 678.227269] ? fput_many+0x2f/0x1a0 [ 678.227960] ? trace_rcu_dyntick+0x2f/0x170 [ 678.228772] __x64_sys_connect+0x6f/0xb0 [ 678.229520] ? syscall_enter_from_user_mode+0x1d/0x50 [ 678.230464] do_syscall_64+0x33/0x40 [ 678.231151] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 678.232101] RIP: 0033:0x7f22a122eb19 [ 678.232783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 678.236157] RSP: 002b:00007f229e7a4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 678.236348] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 678.237533] RAX: ffffffffffffffda RBX: 00007f22a1341f60 RCX: 00007f22a122eb19 [ 678.237573] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 678.237583] RBP: 00007f229e7a41d0 R08: 0000000000000000 R09: 0000000000000000 [ 678.237602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 678.243946] R13: 00007ffd0a40370f R14: 00007f229e7a4300 R15: 0000000000022000 23:06:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 1) 23:06:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:06:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef0100", 0x3c, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:06:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 8) [ 678.469458] FAULT_INJECTION: forcing a failure. [ 678.469458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 678.472113] CPU: 0 PID: 6313 Comm: syz-executor.7 Not tainted 5.10.200 #1 [ 678.473483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 678.475128] Call Trace: [ 678.475694] dump_stack+0x107/0x167 [ 678.476460] should_fail.cold+0x5/0xa [ 678.477248] _copy_to_user+0x2e/0x180 [ 678.478031] simple_read_from_buffer+0xcc/0x160 [ 678.478977] proc_fail_nth_read+0x198/0x230 [ 678.479880] ? proc_sessionid_read+0x230/0x230 [ 678.480814] ? security_file_permission+0x24e/0x570 [ 678.481834] ? perf_trace_initcall_start+0x101/0x380 [ 678.482877] ? proc_sessionid_read+0x230/0x230 [ 678.483805] vfs_read+0x228/0x580 [ 678.484519] ksys_read+0x12d/0x260 [ 678.485234] ? vfs_write+0xa70/0xa70 [ 678.486010] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 678.487073] ? syscall_enter_from_user_mode+0x1d/0x50 [ 678.488157] do_syscall_64+0x33/0x40 [ 678.488905] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 678.489953] RIP: 0033:0x7f22a11e169c [ 678.490693] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 678.494379] RSP: 002b:00007f229e7a4170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 678.495957] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f22a11e169c [ 678.497388] RDX: 000000000000000f RSI: 00007f229e7a41e0 RDI: 0000000000000004 [ 678.498832] RBP: 00007f229e7a41d0 R08: 0000000000000000 R09: 0000000000000000 [ 678.500275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 678.501710] R13: 00007ffd0a40370f R14: 00007f229e7a4300 R15: 0000000000022000 [ 678.504901] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:06:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:06:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) r4 = openat2(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)={0x20000, 0x20, 0x10}, 0x18) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r3, &(0x7f0000000140)={r4, r1, 0xff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@aname={'aname', 0x3d, 'version=9p2000'}}]}}) 23:06:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:06:54 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:06:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:06:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 702.433877] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 702.509429] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:07:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:07:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:07:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(0xffffffffffffffff, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:07:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:07:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @loopback}, 0x1c) 23:07:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0x2, 0x4e20, 0x0, @loopback}, 0x1c) 23:07:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0xa0, 0x10, 0x1, 0x4, 0x0, {}, [@typed={0x4, 0x0, 0x0, 0x0, @str}, @nested={0x85, 0x0, 0x0, 0x1, [@generic="e88b0a7d62836491c9745c9c367f55c2cc60e95760649921cbce1f5e2585e06ca5d96efcbd4874ce326f7553ef3d68e0f500fb7617364357806e5b8a4576ad0ac374f54c18523c71288d4f76484c117ffe87c35fccb893d5c5187b22380ff1f9ebe22cda2719cc3a5845272f907475300c9859b72967c127fbfc68b303fc9c1817"]}]}, 0xa0}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000120011cd00000000000000008000e9"], 0x20}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet6(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000500)="395b7c2d57add1f9df2a7c193237630b7718e13aaee3e67a658f79186e20bb3906f11f399d13f0cccb1e91fd141b643cf5faee0243beccef6b5c06f7ea5c54c65afbeed79d37e36a5bc6ce09f03d58182963e5c6a4927f2f730eae298dae0e00"/110, 0x6e}], 0x1}, 0x24000855) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_RM_DEV(r2, 0x5000940b, &(0x7f0000000880)={{r3}, "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"}) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2a51b6e5c64835bcfb8798ce43822fa65a97b19d6121eb23bbaae7dd2232b35d283ec6cccc2a5001be94e171f7f45af77964c71e0d4baf68c34d581726c240aa8058024968765d510ee10ff9669531dd2c53242e7f8f223421", @ANYRES16=0x0, @ANYRES16=r2], 0x14}}, 0x20004004) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={'geneve0\x00', {0x2, 0x0, @local}}) sendmsg$nl_generic(r4, 0x0, 0x0) unshare(0x48020200) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001e00)={0x0, 0x0, "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", "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"}) 23:07:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 719.687320] 9pnet: Insufficient options for proto=fd [ 719.695279] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.3'. [ 719.697093] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:07:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0x3, 0x4e20, 0x0, @loopback}, 0x1c) 23:07:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:07:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(0xffffffffffffffff, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:07:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 23:07:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x3, 0x0, 0x0, @loopback}, 0x1c) [ 719.834469] 9pnet: Insufficient options for proto=fd 23:07:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0x7, 0x4e20, 0x0, @loopback}, 0x1c) 23:07:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:07:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) 23:07:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:07:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) [ 719.904209] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.3'. [ 719.910432] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:07:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x7, 0x0, 0x0, @loopback}, 0x1c) [ 719.953484] 9pnet: Insufficient options for proto=fd 23:07:12 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(0xffffffffffffffff, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:07:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xe, 0x4e20, 0x0, @loopback}, 0x1c) 23:07:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef01", 0x3b, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:07:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) 23:07:26 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r1, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, 0xffffffffffffffff, 0x0) 23:07:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0x10, 0x4e20, 0x0, @loopback}, 0x1c) 23:07:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:07:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:07:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 23:07:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef01", 0x3b, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:07:26 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(0xffffffffffffffff, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 734.591509] 9pnet: Insufficient options for proto=fd 23:07:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:07:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 734.705484] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 734.735831] 9pnet: Insufficient options for proto=fd 23:07:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 23:07:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:07:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 734.846492] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 734.861128] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 734.882733] 9pnet: Insufficient options for proto=fd [ 749.766076] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:07:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x2, @loopback}, 0x1c) 23:07:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:07:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:07:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) 23:07:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) 23:07:41 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r1, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, 0xffffffffffffffff, 0x0) 23:07:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 749.774761] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:07:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 1) [ 749.837667] FAULT_INJECTION: forcing a failure. [ 749.837667] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 749.840133] CPU: 0 PID: 6475 Comm: syz-executor.1 Not tainted 5.10.200 #1 [ 749.841568] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 749.843295] Call Trace: [ 749.843846] dump_stack+0x107/0x167 [ 749.844633] should_fail.cold+0x5/0xa [ 749.845428] _copy_from_user+0x2e/0x1b0 [ 749.846252] move_addr_to_kernel.part.0+0x31/0x110 [ 749.847276] __sys_connect+0xda/0x1a0 [ 749.848067] ? __sys_connect_file+0x1a0/0x1a0 [ 749.849003] ? perf_trace_preemptirq_template+0x26d/0x400 [ 749.850108] ? perf_trace_preemptirq_template+0x26d/0x400 [ 749.851247] ? __traceiter_irq_enable+0xc0/0xc0 [ 749.852201] ? __traceiter_irq_enable+0xc0/0xc0 [ 749.853162] ? fput_many+0x2f/0x1a0 [ 749.853909] ? trace_rcu_dyntick+0x2f/0x170 [ 749.854804] __x64_sys_connect+0x6f/0xb0 [ 749.855629] ? syscall_enter_from_user_mode+0x1d/0x50 [ 749.856683] do_syscall_64+0x33/0x40 [ 749.857446] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 749.858492] RIP: 0033:0x7f407b6ecb19 [ 749.859250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 749.863042] RSP: 002b:00007f4078c62188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 749.864622] RAX: ffffffffffffffda RBX: 00007f407b7fff60 RCX: 00007f407b6ecb19 [ 749.866099] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 749.867578] RBP: 00007f4078c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 749.869065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 749.870541] R13: 00007ffcf9884f9f R14: 00007f4078c62300 R15: 0000000000022000 23:07:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4, 0x0, @loopback}, 0x1c) 23:07:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:07:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x3, @loopback}, 0x1c) 23:07:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:07:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 2) [ 749.987614] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:07:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 750.058905] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 750.065441] FAULT_INJECTION: forcing a failure. [ 750.065441] name failslab, interval 1, probability 0, space 0, times 0 [ 750.067805] CPU: 0 PID: 6489 Comm: syz-executor.1 Not tainted 5.10.200 #1 [ 750.069224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 750.070895] Call Trace: [ 750.071431] dump_stack+0x107/0x167 [ 750.072170] should_fail.cold+0x5/0xa [ 750.072948] ? __inet_hash_connect+0x674/0xd50 [ 750.073869] should_failslab+0x5/0x20 [ 750.074634] kmem_cache_alloc+0x5b/0x310 [ 750.075463] __inet_hash_connect+0x674/0xd50 [ 750.076367] ? __inet6_lookup_established+0xa90/0xa90 [ 750.077413] ? inet_hash+0x80/0x80 [ 750.078147] tcp_v6_connect+0x1191/0x1c40 [ 750.078989] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 750.079916] ? mark_lock+0xf5/0x2df0 [ 750.080721] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 750.081740] __inet_stream_connect+0x8d8/0xe70 [ 750.082669] ? __traceiter_irq_enable+0xc0/0xc0 [ 750.083602] ? inet_init_net+0x590/0x590 [ 750.084428] ? mark_held_locks+0x9e/0xe0 [ 750.085256] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 750.086306] ? __local_bh_enable_ip+0x9d/0x100 [ 750.087230] inet_stream_connect+0x53/0xa0 [ 750.088083] ? __inet_stream_connect+0xe70/0xe70 [ 750.089050] __sys_connect_file+0x15b/0x1a0 [ 750.089924] __sys_connect+0x165/0x1a0 [ 750.090707] ? __sys_connect_file+0x1a0/0x1a0 [ 750.091617] ? __traceiter_irq_enable+0xc0/0xc0 [ 750.092566] ? __traceiter_irq_enable+0xc0/0xc0 [ 750.093499] ? fput_many+0x2f/0x1a0 [ 750.094241] ? trace_rcu_dyntick+0x2f/0x170 [ 750.095116] __x64_sys_connect+0x6f/0xb0 [ 750.095932] ? syscall_enter_from_user_mode+0x1d/0x50 [ 750.096978] do_syscall_64+0x33/0x40 [ 750.097732] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 750.098765] RIP: 0033:0x7f407b6ecb19 [ 750.099521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 750.103219] RSP: 002b:00007f4078c62188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 750.104762] RAX: ffffffffffffffda RBX: 00007f407b7fff60 RCX: 00007f407b6ecb19 [ 750.106197] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 750.107627] RBP: 00007f4078c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 750.109064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 750.110496] R13: 00007ffcf9884f9f R14: 00007f4078c62300 R15: 0000000000022000 [ 750.122971] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:07:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x5, 0x0, @loopback}, 0x1c) 23:07:42 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r1, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, 0xffffffffffffffff, 0x0) 23:07:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:07:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:07:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:07:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) [ 750.303440] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:07:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 3) 23:07:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:07:56 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000001c0)=0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="d40000002000210c001000000000000002000000ae009680080022000a01010139c2762ff9ba46ff0893b659739bb5f96c60227a0b25e7c1f111044109bafde0897a78eb44338c0cbc86bf56293ee55fc2e0bb0b43645d2456c612cc7191a1cd49d9acd2b2c7e98b6167be6b59663e303cbc6ca0f888bb3730e2fda717c5c05458903eebf4f98129b521ac995853622f691db5a3bc250ecd3e8cadf086a4042a461095362e1a7f5dcd1783eb255cc953405e0ba35a380c00ff00cc9900000000000000001000ff800a0015002c5c282d97000000"], 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x20004004) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4c20, 0x0, @loopback}, 0x1c) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3c196920d8b85fc5, &(0x7f0000000140)=0x5, 0x5, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, r0) sendfile(r2, r1, 0x0, 0x9bbb) 23:07:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @loopback}, 0x1c) 23:07:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:07:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x6, 0x0, @loopback}, 0x1c) 23:07:56 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 1) 23:07:56 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 764.244260] FAULT_INJECTION: forcing a failure. [ 764.244260] name failslab, interval 1, probability 0, space 0, times 0 [ 764.246591] CPU: 0 PID: 6527 Comm: syz-executor.1 Not tainted 5.10.200 #1 [ 764.247997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 764.248900] FAULT_INJECTION: forcing a failure. [ 764.248900] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 764.249697] Call Trace: [ 764.249722] dump_stack+0x107/0x167 [ 764.249750] should_fail.cold+0x5/0xa [ 764.253956] ? create_object.isra.0+0x3a/0xa20 [ 764.254895] should_failslab+0x5/0x20 [ 764.255682] kmem_cache_alloc+0x5b/0x310 [ 764.256516] ? lock_release+0x680/0x680 [ 764.257349] create_object.isra.0+0x3a/0xa20 [ 764.258242] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 764.259287] kmem_cache_alloc+0x159/0x310 [ 764.260138] __inet_hash_connect+0x674/0xd50 [ 764.261067] ? __inet6_lookup_established+0xa90/0xa90 [ 764.262122] ? inet_hash+0x80/0x80 [ 764.262884] tcp_v6_connect+0x1191/0x1c40 [ 764.263737] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 764.264696] ? mark_lock+0xf5/0x2df0 [ 764.265466] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 764.266490] __inet_stream_connect+0x8d8/0xe70 [ 764.267428] ? __traceiter_irq_enable+0xc0/0xc0 [ 764.268378] ? inet_init_net+0x590/0x590 [ 764.269231] ? mark_held_locks+0x9e/0xe0 [ 764.270071] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 764.271136] ? __local_bh_enable_ip+0x9d/0x100 [ 764.272067] inet_stream_connect+0x53/0xa0 [ 764.272942] ? __inet_stream_connect+0xe70/0xe70 [ 764.273904] __sys_connect_file+0x15b/0x1a0 [ 764.274783] __sys_connect+0x165/0x1a0 [ 764.275574] ? __sys_connect_file+0x1a0/0x1a0 [ 764.276490] ? __traceiter_irq_enable+0xc0/0xc0 [ 764.277436] ? __traceiter_irq_enable+0xc0/0xc0 [ 764.278380] ? fput_many+0x2f/0x1a0 [ 764.279124] ? trace_rcu_dyntick+0x2f/0x170 [ 764.280008] __x64_sys_connect+0x6f/0xb0 [ 764.280846] ? syscall_enter_from_user_mode+0x1d/0x50 [ 764.281892] do_syscall_64+0x33/0x40 [ 764.282653] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 764.283690] RIP: 0033:0x7f407b6ecb19 [ 764.284450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 764.288210] RSP: 002b:00007f4078c62188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 764.289760] RAX: ffffffffffffffda RBX: 00007f407b7fff60 RCX: 00007f407b6ecb19 [ 764.291212] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 764.292659] RBP: 00007f4078c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 764.294105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 764.295551] R13: 00007ffcf9884f9f R14: 00007f4078c62300 R15: 0000000000022000 [ 764.297046] CPU: 1 PID: 6531 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 764.298292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 764.299777] Call Trace: [ 764.300257] dump_stack+0x107/0x167 [ 764.300932] should_fail.cold+0x5/0xa [ 764.301636] _copy_from_user+0x2e/0x1b0 [ 764.302362] move_addr_to_kernel.part.0+0x31/0x110 [ 764.303262] __sys_connect+0xda/0x1a0 [ 764.304221] ? __sys_connect_file+0x1a0/0x1a0 [ 764.305053] ? perf_trace_preemptirq_template+0x26d/0x400 [ 764.306058] ? perf_trace_preemptirq_template+0x26d/0x400 [ 764.307015] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 764.307056] ? rcu_read_lock_any_held+0x75/0xa0 [ 764.307078] ? __traceiter_irq_enable+0xc0/0xc0 [ 764.310793] ? __traceiter_irq_enable+0xc0/0xc0 [ 764.311643] ? fput_many+0x2f/0x1a0 [ 764.312317] ? trace_rcu_dyntick+0x2f/0x170 [ 764.313125] __x64_sys_connect+0x6f/0xb0 [ 764.313869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 764.314804] do_syscall_64+0x33/0x40 [ 764.315489] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 764.316427] RIP: 0033:0x7f936cf2ab19 [ 764.317135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 764.320497] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 764.321893] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 764.323193] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 764.324489] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 764.325798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 764.327099] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 23:07:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @loopback}, 0x1c) [ 764.347457] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 764.397477] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:07:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x7, 0x0, @loopback}, 0x1c) [ 764.413373] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:07:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 4) 23:07:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 764.563554] FAULT_INJECTION: forcing a failure. [ 764.563554] name failslab, interval 1, probability 0, space 0, times 0 [ 764.566054] CPU: 0 PID: 6545 Comm: syz-executor.1 Not tainted 5.10.200 #1 [ 764.567453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 764.569151] Call Trace: [ 764.569695] dump_stack+0x107/0x167 [ 764.570449] should_fail.cold+0x5/0xa [ 764.571230] ? __alloc_skb+0x6d/0x5b0 [ 764.572021] should_failslab+0x5/0x20 [ 764.572829] kmem_cache_alloc_node+0x55/0x330 [ 764.573746] ? lock_downgrade+0x6d0/0x6d0 [ 764.574599] __alloc_skb+0x6d/0x5b0 [ 764.575349] ? tcp_write_queue_purge+0x5a8/0x14b0 [ 764.576341] sk_stream_alloc_skb+0x109/0xc30 [ 764.577258] tcp_connect+0xef2/0x4550 [ 764.578057] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 764.579005] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 764.579934] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 764.580955] tcp_v6_connect+0x1419/0x1c40 [ 764.581805] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 764.582745] ? mark_lock+0xf5/0x2df0 [ 764.583521] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 764.584568] __inet_stream_connect+0x8d8/0xe70 [ 764.585509] ? __traceiter_irq_enable+0xc0/0xc0 [ 764.586458] ? inet_init_net+0x590/0x590 [ 764.587293] ? mark_held_locks+0x9e/0xe0 [ 764.588130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 764.589201] ? __local_bh_enable_ip+0x9d/0x100 [ 764.590142] inet_stream_connect+0x53/0xa0 [ 764.590996] ? __inet_stream_connect+0xe70/0xe70 [ 764.591957] __sys_connect_file+0x15b/0x1a0 [ 764.592844] __sys_connect+0x165/0x1a0 [ 764.593635] ? __sys_connect_file+0x1a0/0x1a0 [ 764.594546] ? __traceiter_irq_enable+0xc0/0xc0 [ 764.595484] ? __traceiter_irq_enable+0xc0/0xc0 [ 764.596426] ? fput_many+0x2f/0x1a0 [ 764.597201] ? trace_rcu_dyntick+0x2f/0x170 [ 764.598079] __x64_sys_connect+0x6f/0xb0 [ 764.598896] ? syscall_enter_from_user_mode+0x1d/0x50 [ 764.599935] do_syscall_64+0x33/0x40 [ 764.600704] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 764.601741] RIP: 0033:0x7f407b6ecb19 [ 764.602497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 764.606222] RSP: 002b:00007f4078c62188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 764.607785] RAX: ffffffffffffffda RBX: 00007f407b7fff60 RCX: 00007f407b6ecb19 [ 764.609268] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 764.610729] RBP: 00007f4078c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 764.612176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 764.613641] R13: 00007ffcf9884f9f R14: 00007f4078c62300 R15: 0000000000022000 [ 764.641427] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:08:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:08:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000003c0)=ANY=[]) name_to_handle_at(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x8, 0x2, 0x3ff, 0x2e4, 0x6, 0xfffffffffffffffa}}, &(0x7f0000000480), 0x1c00) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x2000, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000003c0)={'\x00', &(0x7f0000000380)=@ethtool_wolinfo={0x5, 0x0, 0xd90, "d14e4f7379de"}}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x8400, 0x39) write(r1, &(0x7f0000000240)="01", 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000140)=0x6, 0x0) copy_file_range(r4, 0x0, r3, &(0x7f0000000280)=0x10000, 0xc3a, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x7, 0x6, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40000) openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x900, 0x0) 23:08:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) 23:08:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:08:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x8, 0x0, @loopback}, 0x1c) 23:08:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 2) 23:08:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:08:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 5) [ 779.365793] FAULT_INJECTION: forcing a failure. [ 779.365793] name failslab, interval 1, probability 0, space 0, times 0 [ 779.366938] FAULT_INJECTION: forcing a failure. [ 779.366938] name failslab, interval 1, probability 0, space 0, times 0 [ 779.368107] CPU: 1 PID: 6558 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 779.370702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 779.372380] Call Trace: [ 779.372949] dump_stack+0x107/0x167 [ 779.373698] should_fail.cold+0x5/0xa [ 779.374475] ? __inet_hash_connect+0x674/0xd50 [ 779.375398] should_failslab+0x5/0x20 [ 779.376167] kmem_cache_alloc+0x5b/0x310 [ 779.377004] __inet_hash_connect+0x674/0xd50 [ 779.377901] ? __inet6_lookup_established+0xa90/0xa90 [ 779.378945] ? inet_hash+0x80/0x80 [ 779.379693] tcp_v6_connect+0x1191/0x1c40 [ 779.380542] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 779.381478] ? mark_lock+0xf5/0x2df0 [ 779.382253] __inet_stream_connect+0x8d8/0xe70 [ 779.383171] ? lock_release+0x680/0x680 [ 779.383971] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.384921] ? inet_init_net+0x590/0x590 [ 779.385743] ? mark_held_locks+0x9e/0xe0 [ 779.386565] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 779.387621] ? __local_bh_enable_ip+0x9d/0x100 [ 779.388552] inet_stream_connect+0x53/0xa0 [ 779.389411] ? __inet_stream_connect+0xe70/0xe70 [ 779.390367] __sys_connect_file+0x15b/0x1a0 [ 779.391239] __sys_connect+0x165/0x1a0 [ 779.392028] ? __sys_connect_file+0x1a0/0x1a0 [ 779.392955] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.393889] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.394823] ? fput_many+0x2f/0x1a0 [ 779.395564] ? trace_rcu_dyntick+0x2f/0x170 [ 779.396461] __x64_sys_connect+0x6f/0xb0 [ 779.397288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 779.398339] do_syscall_64+0x33/0x40 [ 779.399094] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 779.400142] RIP: 0033:0x7f936cf2ab19 [ 779.400911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.404613] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 779.406157] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 779.407592] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 779.409044] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 779.410477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 779.411916] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 [ 779.413390] CPU: 0 PID: 6568 Comm: syz-executor.1 Not tainted 5.10.200 #1 [ 779.414143] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 779.415065] Call Trace: [ 779.415361] dump_stack+0x107/0x167 [ 779.415769] should_fail.cold+0x5/0xa [ 779.416198] ? create_object.isra.0+0x3a/0xa20 [ 779.416714] should_failslab+0x5/0x20 [ 779.417147] kmem_cache_alloc+0x5b/0x310 [ 779.417591] create_object.isra.0+0x3a/0xa20 [ 779.418073] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 779.418625] kmem_cache_alloc_node+0x169/0x330 [ 779.419136] ? lock_downgrade+0x6d0/0x6d0 [ 779.419604] __alloc_skb+0x6d/0x5b0 [ 779.420006] ? tcp_write_queue_purge+0x5a8/0x14b0 [ 779.420538] sk_stream_alloc_skb+0x109/0xc30 [ 779.421070] tcp_connect+0xef2/0x4550 [ 779.421134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 779.421504] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 779.421514] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 779.421526] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 779.421551] tcp_v6_connect+0x1419/0x1c40 [ 779.425597] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 779.426104] ? mark_lock+0xf5/0x2df0 [ 779.426524] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 779.427081] __inet_stream_connect+0x8d8/0xe70 [ 779.427593] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.428105] ? inet_init_net+0x590/0x590 [ 779.428549] ? mark_held_locks+0x9e/0xe0 [ 779.428631] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 779.429020] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 779.431641] ? __local_bh_enable_ip+0x9d/0x100 [ 779.432145] inet_stream_connect+0x53/0xa0 [ 779.432613] ? __inet_stream_connect+0xe70/0xe70 [ 779.433147] __sys_connect_file+0x15b/0x1a0 [ 779.433628] __sys_connect+0x165/0x1a0 [ 779.434059] ? __sys_connect_file+0x1a0/0x1a0 [ 779.434570] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.435086] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.435614] ? fput_many+0x2f/0x1a0 [ 779.436028] ? trace_rcu_dyntick+0x2f/0x170 [ 779.436519] __x64_sys_connect+0x6f/0xb0 [ 779.436987] ? syscall_enter_from_user_mode+0x1d/0x50 [ 779.437561] do_syscall_64+0x33/0x40 [ 779.437980] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 779.438551] RIP: 0033:0x7f407b6ecb19 [ 779.438959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.440993] RSP: 002b:00007f4078c62188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 779.441831] RAX: ffffffffffffffda RBX: 00007f407b7fff60 RCX: 00007f407b6ecb19 [ 779.442615] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 779.443404] RBP: 00007f4078c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 779.444191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 779.444999] R13: 00007ffcf9884f9f R14: 00007f4078c62300 R15: 0000000000022000 23:08:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 3) [ 779.476172] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 23:08:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 6) 23:08:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xe, 0x0, @loopback}, 0x1c) 23:08:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) [ 779.523369] FAULT_INJECTION: forcing a failure. [ 779.523369] name failslab, interval 1, probability 0, space 0, times 0 [ 779.524656] CPU: 0 PID: 6580 Comm: syz-executor.1 Not tainted 5.10.200 #1 [ 779.525416] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 779.526345] Call Trace: [ 779.526642] dump_stack+0x107/0x167 [ 779.527067] should_fail.cold+0x5/0xa [ 779.527510] should_failslab+0x5/0x20 [ 779.527933] __kmalloc_node_track_caller+0x74/0x3b0 [ 779.528486] ? sk_stream_alloc_skb+0x109/0xc30 [ 779.529015] ? lock_downgrade+0x6d0/0x6d0 [ 779.529469] __alloc_skb+0xb1/0x5b0 [ 779.529869] sk_stream_alloc_skb+0x109/0xc30 [ 779.530360] tcp_connect+0xef2/0x4550 [ 779.530791] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 779.531296] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 779.531797] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 779.532363] tcp_v6_connect+0x1419/0x1c40 [ 779.532830] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 779.533328] ? mark_lock+0xf5/0x2df0 [ 779.533753] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 779.534320] __inet_stream_connect+0x8d8/0xe70 [ 779.534827] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.535343] ? inet_init_net+0x590/0x590 [ 779.535795] ? mark_held_locks+0x9e/0xe0 [ 779.536252] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 779.536855] ? __local_bh_enable_ip+0x9d/0x100 [ 779.537363] inet_stream_connect+0x53/0xa0 [ 779.537835] ? __inet_stream_connect+0xe70/0xe70 [ 779.538361] __sys_connect_file+0x15b/0x1a0 [ 779.538841] __sys_connect+0x165/0x1a0 [ 779.539277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 779.540399] ? __sys_connect_file+0x1a0/0x1a0 [ 779.540910] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 779.541512] ? trace_hardirqs_on+0x5b/0x180 [ 779.541989] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 779.542599] __x64_sys_connect+0x6f/0xb0 [ 779.543059] do_syscall_64+0x33/0x40 [ 779.543478] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 779.544042] RIP: 0033:0x7f407b6ecb19 [ 779.544458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.546498] RSP: 002b:00007f4078c62188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 779.547340] RAX: ffffffffffffffda RBX: 00007f407b7fff60 RCX: 00007f407b6ecb19 [ 779.547678] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 779.548119] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 779.548126] RBP: 00007f4078c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 779.548132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 779.548139] R13: 00007ffcf9884f9f R14: 00007f4078c62300 R15: 0000000000022000 [ 779.551590] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 23:08:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 7) 23:08:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 779.631213] FAULT_INJECTION: forcing a failure. [ 779.631213] name failslab, interval 1, probability 0, space 0, times 0 [ 779.634033] CPU: 1 PID: 6587 Comm: syz-executor.1 Not tainted 5.10.200 #1 [ 779.635448] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 779.637128] Call Trace: [ 779.637673] dump_stack+0x107/0x167 [ 779.638442] should_fail.cold+0x5/0xa [ 779.639246] ? create_object.isra.0+0x3a/0xa20 [ 779.640192] should_failslab+0x5/0x20 [ 779.641012] kmem_cache_alloc+0x5b/0x310 [ 779.641875] create_object.isra.0+0x3a/0xa20 [ 779.642795] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 779.643859] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 779.644914] ? sk_stream_alloc_skb+0x109/0xc30 [ 779.645853] ? lock_downgrade+0x6d0/0x6d0 [ 779.646710] __alloc_skb+0xb1/0x5b0 [ 779.647468] sk_stream_alloc_skb+0x109/0xc30 [ 779.648380] tcp_connect+0xef2/0x4550 [ 779.649198] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 779.650153] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 779.651094] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 779.652128] tcp_v6_connect+0x1419/0x1c40 [ 779.653005] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 779.653956] ? mark_lock+0xf5/0x2df0 [ 779.654757] __inet_stream_connect+0x8d8/0xe70 [ 779.655698] ? lock_release+0x680/0x680 [ 779.656513] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.657477] ? inet_init_net+0x590/0x590 [ 779.658322] ? mark_held_locks+0x9e/0xe0 [ 779.659164] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 779.660239] ? __local_bh_enable_ip+0x9d/0x100 [ 779.661202] inet_stream_connect+0x53/0xa0 [ 779.662076] ? __inet_stream_connect+0xe70/0xe70 [ 779.663056] __sys_connect_file+0x15b/0x1a0 [ 779.663946] __sys_connect+0x165/0x1a0 [ 779.664751] ? __sys_connect_file+0x1a0/0x1a0 [ 779.665680] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.666636] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.667592] ? fput_many+0x2f/0x1a0 [ 779.668350] ? trace_rcu_dyntick+0x2f/0x170 [ 779.669271] __x64_sys_connect+0x6f/0xb0 [ 779.670103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 779.671161] do_syscall_64+0x33/0x40 [ 779.671931] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 779.672982] RIP: 0033:0x7f407b6ecb19 [ 779.673745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.677497] RSP: 002b:00007f4078c62188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 779.679050] RAX: ffffffffffffffda RBX: 00007f407b7fff60 RCX: 00007f407b6ecb19 [ 779.680503] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 779.681962] RBP: 00007f4078c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 779.683407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 779.684858] R13: 00007ffcf9884f9f R14: 00007f4078c62300 R15: 0000000000022000 [ 779.710710] FAULT_INJECTION: forcing a failure. [ 779.710710] name failslab, interval 1, probability 0, space 0, times 0 [ 779.711937] CPU: 0 PID: 6590 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 779.712674] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 779.713583] Call Trace: [ 779.713869] dump_stack+0x107/0x167 [ 779.714262] should_fail.cold+0x5/0xa [ 779.714669] ? create_object.isra.0+0x3a/0xa20 [ 779.715162] should_failslab+0x5/0x20 [ 779.715583] kmem_cache_alloc+0x5b/0x310 [ 779.716025] ? lock_release+0x680/0x680 [ 779.716463] create_object.isra.0+0x3a/0xa20 [ 779.716938] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 779.717484] kmem_cache_alloc+0x159/0x310 [ 779.717933] __inet_hash_connect+0x674/0xd50 [ 779.718416] ? __inet6_lookup_established+0xa90/0xa90 [ 779.718966] ? inet_hash+0x80/0x80 [ 779.719354] tcp_v6_connect+0x1191/0x1c40 [ 779.719801] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 779.720296] ? mark_lock+0xf5/0x2df0 [ 779.720701] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 779.721281] __inet_stream_connect+0x8d8/0xe70 [ 779.721775] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.722298] ? inet_init_net+0x590/0x590 [ 779.722736] ? mark_held_locks+0x9e/0xe0 [ 779.723200] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 779.723761] ? __local_bh_enable_ip+0x9d/0x100 [ 779.724278] inet_stream_connect+0x53/0xa0 [ 779.724753] ? __inet_stream_connect+0xe70/0xe70 [ 779.725291] __sys_connect_file+0x15b/0x1a0 [ 779.725760] __sys_connect+0x165/0x1a0 [ 779.726206] ? __sys_connect_file+0x1a0/0x1a0 [ 779.726694] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.727216] ? __traceiter_irq_enable+0xc0/0xc0 [ 779.727714] ? fput_many+0x2f/0x1a0 [ 779.728131] ? trace_rcu_dyntick+0x2f/0x170 [ 779.728613] __x64_sys_connect+0x6f/0xb0 [ 779.729058] ? syscall_enter_from_user_mode+0x1d/0x50 [ 779.729632] do_syscall_64+0x33/0x40 [ 779.730037] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 779.730613] RIP: 0033:0x7f936cf2ab19 [ 779.731013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.733081] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 779.733898] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 779.734682] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 779.735466] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 779.736251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 779.737047] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 23:08:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x50, 0x0, @loopback}, 0x1c) 23:08:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe, @loopback}, 0x1c) [ 779.770335] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 779.772594] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 779.804854] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:08:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 8) 23:08:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) vmsplice(r5, &(0x7f0000000240)=[{&(0x7f00000015c0)=',', 0xa302}], 0x10000000000002a3, 0x0) close(r5) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8916, &(0x7f0000000100)={@mcast1, 0x0, r4}) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="ac000000130000042dbd7000ffdbdf25159e053e4e244e2405000000800000000700000001000000ff0f0000020000000300000008000000", @ANYRES32=r4, @ANYBLOB="000000000700000003000000010000000b0001008c5d14ca7613a300540001009cb0a60b6a57da9d360d1980b21c742168957b1b7209e9575fab3988c069a7f31382dd17206fa8cf8abb0e73aade3ae87a78526b571240a835b80fe03294cc4925a521931ebbc2044c5065c5ced00fd5736ff263251c7cdff82fc2839eb9106b1a658dde00d1b73e3edddb90d2457a657196e83ef6f7f5ecbde215cd6618bcf3e6f725543eca5ac98c07b237ad380a50537a39d9f283dec204a4e369af06c76880287236d5eb76711378a1"], 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="f00000001a0001000000000000000000e000000200"/64, @ANYRES32=r4, @ANYRES32=0xee01, @ANYBLOB="fc0200000000000000000000000000000000000033000000ff0100000000000000000000000000010000000000000000000000000000000000000000080000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001400"/154], 0xf0}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r6, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)={0x44, r7, 0x1, 0x0, 0x0, {0x8}, [@ETHTOOL_A_EEE_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}]}, 0x44}}, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0xe, &(0x7f0000000280)={@empty, r9}, 0x14) 23:08:27 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:08:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, 0x0) 23:08:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x5e, 0x0, @loopback}, 0x1c) 23:08:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x48, @loopback}, 0x1c) 23:08:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:08:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 4) [ 795.680755] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 795.702715] FAULT_INJECTION: forcing a failure. [ 795.702715] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 795.705093] CPU: 1 PID: 6618 Comm: syz-executor.1 Not tainted 5.10.200 #1 [ 795.706490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 795.708157] Call Trace: [ 795.708691] dump_stack+0x107/0x167 [ 795.709462] should_fail.cold+0x5/0xa [ 795.710246] _copy_to_user+0x2e/0x180 [ 795.711031] simple_read_from_buffer+0xcc/0x160 [ 795.711981] proc_fail_nth_read+0x198/0x230 [ 795.712867] ? proc_sessionid_read+0x230/0x230 [ 795.713799] ? security_file_permission+0x24e/0x570 [ 795.714810] ? perf_trace_initcall_start+0x101/0x380 [ 795.715843] ? proc_sessionid_read+0x230/0x230 [ 795.716759] vfs_read+0x228/0x580 [ 795.717471] ksys_read+0x12d/0x260 [ 795.718184] ? vfs_write+0xa70/0xa70 [ 795.718938] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 795.719993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 795.721050] do_syscall_64+0x33/0x40 [ 795.721802] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 795.722822] RIP: 0033:0x7f407b69f69c [ 795.723574] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 795.727284] RSP: 002b:00007f4078c62170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 795.728805] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f407b69f69c [ 795.730258] RDX: 000000000000000f RSI: 00007f4078c621e0 RDI: 0000000000000004 [ 795.731701] RBP: 00007f4078c621d0 R08: 0000000000000000 R09: 0000000000000000 [ 795.733133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 795.734566] R13: 00007ffcf9884f9f R14: 00007f4078c62300 R15: 0000000000022000 [ 795.737051] FAULT_INJECTION: forcing a failure. [ 795.737051] name failslab, interval 1, probability 0, space 0, times 0 [ 795.739296] CPU: 1 PID: 6619 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 795.740654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 795.742302] Call Trace: 23:08:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfc, 0x0, @loopback}, 0x1c) [ 795.742822] dump_stack+0x107/0x167 [ 795.743681] should_fail.cold+0x5/0xa [ 795.744445] ? __alloc_skb+0x6d/0x5b0 [ 795.745222] should_failslab+0x5/0x20 [ 795.745992] kmem_cache_alloc_node+0x55/0x330 [ 795.746878] ? lock_downgrade+0x6d0/0x6d0 [ 795.747715] __alloc_skb+0x6d/0x5b0 [ 795.748432] ? tcp_write_queue_purge+0x5a8/0x14b0 [ 795.749420] sk_stream_alloc_skb+0x109/0xc30 [ 795.750319] tcp_connect+0xef2/0x4550 [ 795.751100] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 795.752020] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 795.752943] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 795.753926] tcp_v6_connect+0x1419/0x1c40 [ 795.754753] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 795.755660] ? mark_lock+0xf5/0x2df0 [ 795.756417] __inet_stream_connect+0x8d8/0xe70 [ 795.757339] ? lock_release+0x680/0x680 [ 795.758128] ? __traceiter_irq_enable+0xc0/0xc0 [ 795.759050] ? inet_init_net+0x590/0x590 [ 795.759856] ? mark_held_locks+0x9e/0xe0 [ 795.760668] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 795.761721] ? __local_bh_enable_ip+0x9d/0x100 [ 795.762635] inet_stream_connect+0x53/0xa0 [ 795.763499] ? __inet_stream_connect+0xe70/0xe70 [ 795.764443] __sys_connect_file+0x15b/0x1a0 [ 795.765311] __sys_connect+0x165/0x1a0 [ 795.766077] ? __sys_connect_file+0x1a0/0x1a0 [ 795.766962] ? __traceiter_irq_enable+0xc0/0xc0 [ 795.767875] ? __traceiter_irq_enable+0xc0/0xc0 [ 795.768802] ? fput_many+0x2f/0x1a0 [ 795.769547] ? trace_rcu_dyntick+0x2f/0x170 [ 795.770411] __x64_sys_connect+0x6f/0xb0 [ 795.771219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 795.772239] do_syscall_64+0x33/0x40 [ 795.773066] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 795.774063] RIP: 0033:0x7f936cf2ab19 [ 795.774854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 795.778243] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 795.779833] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 795.781185] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 795.782522] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 795.783869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 795.785222] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 [ 795.797186] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:08:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, 0x0) 23:08:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x50, @loopback}, 0x1c) 23:08:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x1f4, 0x0, @loopback}, 0x1c) [ 795.946764] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:08:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, 0x0) [ 795.966304] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:08:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:08:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x56, @loopback}, 0x1c) 23:08:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x218, 0x0, @loopback}, 0x1c) 23:08:28 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000780)='./binderfs/binder0\x00', 0x800, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @loopback}, &(0x7f0000000800)=0x10, 0x80c00) sendfile(r0, r1, 0x0, 0x5) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) writev(r2, &(0x7f00000006c0)=[{&(0x7f0000000000)="13266e76e204adee805f8b037f3b4d0b9d728d968f33c68ddaafa53548b1f7916f34311fa6259da6c5d79e281464cb9a7de24591e23d7b544c864267e9119423f12be8740019c819dbdb7670f6304409e2e9c4f56832ffea1f8e801dc58f213d35722867bb95dd433f3533fc5e1d7fafe5ac85ecb622fe84fec70b95a384a63d36c86fff91792d149d04f2ffcfe4426d245c1b7e2fb0ecb917ec60086c6ec6dd5e81907b2867ba2640b0e7f022dc117deca4024a88e69511aa6dbabbe09970655409c78e06762751f5249bfe041f44387be3dcfb9d23e3b29a4b20f9ccc3ff833ffbb7099515021c3ad7", 0xea}, {&(0x7f0000000100)="ae4910a600ea9b3a5ae6e5cea07678437eca95448ebbf9a31d93080a777f971eba3938e1286db79f1cd8527a90c621628d3e6595c9b47088dc52e6112cd5209de5f3e556a36b3034a9d5d6fdd34438ef88d67397752abea335ad2307b77f969dc171c6dbcb0a23e967634560a38905fcd858f9f2aa83cde569113602e2011d3ddfcd24870593d16776bbaa886cb22b34a2d86c3bae57d3119ec732a1742cf4ea4345205129bc752e028979c09cb798ff9f44db42ce6860e9c557c35bc56504714fbf33a81f36b057728efc16c90f06ae5805fc619e5f889766eef13e24dcc22ac54a654c6417f4e20fa82da0f4", 0xed}, {&(0x7f0000000200)="ee3e9b40730f6e60fc80a41b8bf1ba1e1e29cfa6060e87fa20472528a80ea7552a60cb8d868f8d560c42314e761458774aff83310715816419bf620fb863d5df33b132b0c56cf0d4166d9293adb0da8d2702f3374ed4c2f7449dd69f5fc9f834fc36eaa8b054ccce61f968f6c08c172ea64d213e5d66f54a3bf723a83dc8c9b196ab84ec4a42ec289656e3a5eba6094149e3f56c80401201abf7ebe5a71849ce34703c58b8253af7051d80822795c78fff3c564e81403a108cf314b9e4dc16067e6736", 0xc3}, {&(0x7f0000000300)="bd8ff61b6555360cadc943a827c507c4d092e8b07652dce22a94928cf5a6d087f14635b6ce3149c66d242d07eaa8e68a15ab95eaedb84ab98046d003802ebb64a86d1023453292f33581055b62f85bf13e1f4db697907c945e28e5fb8851368137efb44687d51099308466a84d708fd11774ec1eec9f0931f5f2e7b0548cf8951cf88c6ab586abb667f4236c2d168dc10a13b7c808ddb4a77c9d8caa41ee", 0x9e}, {&(0x7f00000003c0)="d8fa61d7ad5684b6a67d0cddea934c8e26b546c7096c39d096f83c91b0fa560912dd44029b28d5e683eace8dad5901e10900e8d1746b0d099680ae79bf20f1c9ee54920818bbc8b52fc219c6e0c4e959e3cddc1a53c65f84506572d4cb7840e36fbdb0facb397a7ad7", 0x69}, {&(0x7f0000000440)="01565e8725f23b7c08df3c0985213c9bd148d5a939a31eb25953f9200a61b714fa3aa2ef6801df3e3be475fa10fc9a439900b99bb473c88b62e53ea3c38bf155a9ea", 0x42}, {&(0x7f00000004c0)="f789e4e2e92bf2d5c6e19e3060bbda047711125df68005aee819a4a887e6d9aa7db15d50e4164788896309ebcf18687d62dd5c107bcc5bbb3c4dfcb9a3ed782ba0b90aa9ed487a5532bfaca025fc2206935be393cf6ec69ac75c5048fd76528a1f1f8a80bbfed9e106499a637921a29a68e7953e1ec5b01a967b6d98c67bbb23d23f53bbfefdb41a351c7f531a4ad5f776927b7e24459a309973e6c793e2e90e8b2a3268e1b3fcb266ac", 0xaa}, {&(0x7f0000000580)="91b8bbdc36d3dbe0de8d2b9d87b131326d8a1e67e1583894022b1083fc328c4343861d7bd5e067afe97d526916a81b115ad65531", 0x34}, {&(0x7f00000005c0)="729dc8557a9e10cd1f749af585816165d0ac05f94d52e8c4d93bca28a88781703efb44222bc23d8f47a7c089c65cdf1aef97f4357deda6a5f5314dc3b4ee63ee402114973addbf7530792c0e604be2a717523a7590740bf075e5", 0x5a}, {&(0x7f0000000640)="5095a7c9fc132cbfbc7bb81d4c5b884fe6eb9d9c22c97fb195b80892631b70bc2bec60282e96ab9650ae86ca346507d1a6f49a19ec83408953ba2a3591958eb855879f7013b798caea08662ee273478e87c6fe7265f1d88662330c15245d8cc07e702f25a1e327", 0x67}], 0xa) [ 796.103651] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 796.119439] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:08:43 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:08:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @loopback}, 0x1c) 23:08:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:08:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 5) 23:08:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5e, @loopback}, 0x1c) 23:08:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x240, 0x0, @loopback}, 0x1c) 23:08:43 executing program 3: fchmod(0xffffffffffffffff, 0x0) r0 = fork() ptrace(0x10, r0) ptrace(0x4208, r0) r1 = fork() ptrace(0x10, r1) ptrace(0x4208, r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0, 0x5}}, r1, 0xd, 0xffffffffffffffff, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000000), 0x80000000, &(0x7f0000000100)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001200010000000b0000001d00000000000000000000000d002000ef2c0fac2900000000000000000000000400000000f4dd"], 0x3c}}, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = fsmount(r3, 0x1, 0x81) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f00000001c0)={0x5, 0x7, 0x3}, 0xc) 23:08:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x300, 0x0, @loopback}, 0x1c) 23:08:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 1) [ 810.963594] FAULT_INJECTION: forcing a failure. [ 810.963594] name failslab, interval 1, probability 0, space 0, times 0 [ 810.964883] CPU: 0 PID: 6668 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 810.965628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 810.966500] Call Trace: [ 810.966786] dump_stack+0x107/0x167 [ 810.967176] should_fail.cold+0x5/0xa [ 810.967593] ? __do_sys_memfd_create+0xfb/0x450 [ 810.968099] should_failslab+0x5/0x20 [ 810.968506] __kmalloc+0x72/0x390 [ 810.968874] __do_sys_memfd_create+0xfb/0x450 [ 810.969360] ? memfd_file_seals_ptr+0x170/0x170 [ 810.969857] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 810.970408] ? syscall_enter_from_user_mode+0x1d/0x50 [ 810.970953] do_syscall_64+0x33/0x40 [ 810.971353] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 810.971901] RIP: 0033:0x7f1739f10b19 [ 810.972307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 810.974292] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 810.975099] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 810.975872] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 810.976640] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 810.977396] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 810.977848] FAULT_INJECTION: forcing a failure. [ 810.977848] name failslab, interval 1, probability 0, space 0, times 0 [ 810.978178] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 [ 810.982011] CPU: 1 PID: 6670 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 810.983396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 810.985069] Call Trace: [ 810.985625] dump_stack+0x107/0x167 [ 810.986369] should_fail.cold+0x5/0xa [ 810.987140] ? create_object.isra.0+0x3a/0xa20 [ 810.988075] should_failslab+0x5/0x20 [ 810.988843] kmem_cache_alloc+0x5b/0x310 [ 810.989677] create_object.isra.0+0x3a/0xa20 [ 810.990568] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 810.991600] kmem_cache_alloc_node+0x169/0x330 [ 810.992523] ? lock_downgrade+0x6d0/0x6d0 [ 810.993388] __alloc_skb+0x6d/0x5b0 [ 810.993789] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 810.994123] ? tcp_write_queue_purge+0x5a8/0x14b0 [ 810.994146] sk_stream_alloc_skb+0x109/0xc30 [ 810.994174] tcp_connect+0xef2/0x4550 [ 810.997765] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 810.998701] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 810.999627] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 811.000634] tcp_v6_connect+0x1419/0x1c40 [ 811.001495] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 811.002419] ? mark_lock+0xf5/0x2df0 [ 811.003200] __inet_stream_connect+0x8d8/0xe70 [ 811.004124] ? lock_release+0x680/0x680 [ 811.004929] ? __traceiter_irq_enable+0xc0/0xc0 [ 811.005880] ? inet_init_net+0x590/0x590 [ 811.006704] ? mark_held_locks+0x9e/0xe0 [ 811.007527] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 811.008582] ? __local_bh_enable_ip+0x9d/0x100 [ 811.009516] inet_stream_connect+0x53/0xa0 [ 811.010375] ? __inet_stream_connect+0xe70/0xe70 [ 811.011322] __sys_connect_file+0x15b/0x1a0 [ 811.012198] __sys_connect+0x165/0x1a0 [ 811.012977] ? __sys_connect_file+0x1a0/0x1a0 [ 811.013902] ? __traceiter_irq_enable+0xc0/0xc0 [ 811.014832] ? __traceiter_irq_enable+0xc0/0xc0 [ 811.015769] ? fput_many+0x2f/0x1a0 [ 811.016511] ? trace_rcu_dyntick+0x2f/0x170 [ 811.017398] __x64_sys_connect+0x6f/0xb0 [ 811.018212] ? syscall_enter_from_user_mode+0x1d/0x50 [ 811.019258] do_syscall_64+0x33/0x40 [ 811.020015] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 811.021047] RIP: 0033:0x7f936cf2ab19 [ 811.021804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 811.025514] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 811.027051] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 811.028486] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 811.029929] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 811.031364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 811.032288] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 811.032789] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 [ 811.037084] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:08:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3e8, 0x0, @loopback}, 0x1c) [ 811.048564] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 811.064505] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:08:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 2) 23:08:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x3, 0x0, 0x0, @loopback}, 0x1c) [ 811.097312] FAULT_INJECTION: forcing a failure. [ 811.097312] name failslab, interval 1, probability 0, space 0, times 0 [ 811.099751] CPU: 1 PID: 6686 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 811.101167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 811.102843] Call Trace: [ 811.103385] dump_stack+0x107/0x167 [ 811.104123] should_fail.cold+0x5/0xa [ 811.104907] ? create_object.isra.0+0x3a/0xa20 [ 811.105847] should_failslab+0x5/0x20 [ 811.106632] kmem_cache_alloc+0x5b/0x310 [ 811.107463] create_object.isra.0+0x3a/0xa20 [ 811.108359] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 811.109404] __kmalloc+0x16e/0x390 [ 811.110138] __do_sys_memfd_create+0xfb/0x450 [ 811.111042] ? memfd_file_seals_ptr+0x170/0x170 [ 811.111985] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 811.113041] ? syscall_enter_from_user_mode+0x1d/0x50 [ 811.114112] do_syscall_64+0x33/0x40 [ 811.114867] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 811.115906] RIP: 0033:0x7f1739f10b19 [ 811.116658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 811.120412] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 811.121955] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 811.123405] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 811.124842] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 811.126292] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 811.127738] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 23:08:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfc, @loopback}, 0x1c) 23:08:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x500, 0x0, @loopback}, 0x1c) 23:08:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 6) [ 811.176783] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 811.181987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 811.185644] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 811.264947] FAULT_INJECTION: forcing a failure. [ 811.264947] name failslab, interval 1, probability 0, space 0, times 0 [ 811.266299] CPU: 0 PID: 6697 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 811.267028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 811.267926] Call Trace: [ 811.268211] dump_stack+0x107/0x167 [ 811.268600] should_fail.cold+0x5/0xa [ 811.269021] should_failslab+0x5/0x20 [ 811.269447] __kmalloc_node_track_caller+0x74/0x3b0 [ 811.269982] ? sk_stream_alloc_skb+0x109/0xc30 [ 811.270476] ? lock_downgrade+0x6d0/0x6d0 [ 811.270923] __alloc_skb+0xb1/0x5b0 [ 811.271320] sk_stream_alloc_skb+0x109/0xc30 [ 811.271790] tcp_connect+0xef2/0x4550 [ 811.272217] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 811.272721] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 811.273223] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 811.273750] tcp_v6_connect+0x1419/0x1c40 [ 811.274189] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 811.274669] ? mark_lock+0xf5/0x2df0 [ 811.275071] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 811.275599] __inet_stream_connect+0x8d8/0xe70 [ 811.276083] ? __traceiter_irq_enable+0xc0/0xc0 [ 811.276567] ? inet_init_net+0x590/0x590 [ 811.276999] ? mark_held_locks+0x9e/0xe0 [ 811.277440] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 811.277988] ? __local_bh_enable_ip+0x9d/0x100 [ 811.278472] inet_stream_connect+0x53/0xa0 [ 811.278920] ? __inet_stream_connect+0xe70/0xe70 [ 811.279418] __sys_connect_file+0x15b/0x1a0 [ 811.279874] __sys_connect+0x165/0x1a0 [ 811.280278] ? __sys_connect_file+0x1a0/0x1a0 [ 811.280757] ? __traceiter_irq_enable+0xc0/0xc0 [ 811.281248] ? __traceiter_irq_enable+0xc0/0xc0 [ 811.281738] ? fput_many+0x2f/0x1a0 [ 811.282128] ? trace_rcu_dyntick+0x2f/0x170 [ 811.282589] __x64_sys_connect+0x6f/0xb0 [ 811.283015] ? syscall_enter_from_user_mode+0x1d/0x50 [ 811.283556] do_syscall_64+0x33/0x40 [ 811.283951] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 811.284494] RIP: 0033:0x7f936cf2ab19 [ 811.284885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 811.286793] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 811.287585] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 811.288328] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 811.289067] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 811.289817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 811.290560] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 [ 827.160942] FAULT_INJECTION: forcing a failure. [ 827.160942] name failslab, interval 1, probability 0, space 0, times 0 [ 827.163273] CPU: 0 PID: 6705 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 827.164687] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 827.166390] Call Trace: [ 827.166932] dump_stack+0x107/0x167 [ 827.167678] should_fail.cold+0x5/0xa [ 827.168452] ? create_object.isra.0+0x3a/0xa20 [ 827.169409] should_failslab+0x5/0x20 [ 827.169459] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 827.170185] kmem_cache_alloc+0x5b/0x310 [ 827.170212] create_object.isra.0+0x3a/0xa20 [ 827.173965] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 827.175000] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 827.176027] ? sk_stream_alloc_skb+0x109/0xc30 [ 827.176961] __alloc_skb+0xb1/0x5b0 [ 827.177726] sk_stream_alloc_skb+0x109/0xc30 [ 827.178637] tcp_connect+0xef2/0x4550 [ 827.179428] ? __tcp_transmit_skb+0x35c0/0x35c0 [ 827.180364] ? secure_tcpv6_ts_off+0x1bc/0x2a0 [ 827.181301] ? tcp_fastopen_cookie_check+0xb0/0xb0 [ 827.182322] tcp_v6_connect+0x1419/0x1c40 [ 827.183169] ? inet6_sk_rx_dst_set+0x2e0/0x2e0 [ 827.184100] ? mark_lock+0xf5/0x2df0 [ 827.184867] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 827.185896] __inet_stream_connect+0x8d8/0xe70 [ 827.186830] ? __traceiter_irq_enable+0xc0/0xc0 [ 827.187771] ? inet_init_net+0x590/0x590 [ 827.188596] ? mark_held_locks+0x9e/0xe0 [ 827.189436] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 827.190499] ? __local_bh_enable_ip+0x9d/0x100 [ 827.191436] inet_stream_connect+0x53/0xa0 [ 827.192292] ? __inet_stream_connect+0xe70/0xe70 [ 827.193253] __sys_connect_file+0x15b/0x1a0 [ 827.194139] __sys_connect+0x165/0x1a0 [ 827.194936] ? __sys_connect_file+0x1a0/0x1a0 [ 827.195532] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 827.195853] ? __traceiter_irq_enable+0xc0/0xc0 [ 827.198860] ? __traceiter_irq_enable+0xc0/0xc0 [ 827.199803] ? fput_many+0x2f/0x1a0 [ 827.200557] ? trace_rcu_dyntick+0x2f/0x170 [ 827.201459] __x64_sys_connect+0x6f/0xb0 [ 827.202289] ? syscall_enter_from_user_mode+0x1d/0x50 [ 827.203356] do_syscall_64+0x33/0x40 [ 827.204118] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 827.205158] RIP: 0033:0x7f936cf2ab19 [ 827.205924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 827.209676] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 827.211217] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 827.212673] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 827.214145] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 827.215606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 827.217059] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 [ 827.220422] FAULT_INJECTION: forcing a failure. [ 827.220422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 827.223245] CPU: 0 PID: 6707 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 827.224888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 827.226899] Call Trace: [ 827.227543] dump_stack+0x107/0x167 [ 827.228426] should_fail.cold+0x5/0xa [ 827.229374] _copy_from_user+0x2e/0x1b0 [ 827.230347] __do_sys_memfd_create+0x16d/0x450 [ 827.231343] ? memfd_file_seals_ptr+0x170/0x170 [ 827.232290] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 827.233355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 827.234404] do_syscall_64+0x33/0x40 [ 827.235154] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 827.236183] RIP: 0033:0x7f1739f10b19 [ 827.236936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 827.240669] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 827.242226] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 827.243664] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 827.245101] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 827.246547] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 827.248010] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 [ 827.249690] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:08:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x7, 0x0, 0x0, @loopback}, 0x1c) 23:08:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x600, 0x0, @loopback}, 0x1c) 23:08:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:08:59 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 7) 23:08:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x1f4, @loopback}, 0x1c) 23:08:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 3) 23:08:59 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:08:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000002c0)=@getpolicy={0x5c, 0x15, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, 0x6e6bbe}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0x5c}}, 0x0) sync_file_range(r0, 0x7, 0x36b0, 0x7) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x880) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0xcc}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000140)={'wpan0\x00'}) sendmsg$NLBL_MGMT_C_ADD(r3, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x1c}}, 0xc0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000202"], 0x1c}}, 0x0) 23:08:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x218, @loopback}, 0x1c) 23:08:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x700, 0x0, @loopback}, 0x1c) [ 827.321600] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 23:08:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 827.387201] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 827.406944] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:08:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xe00, 0x0, @loopback}, 0x1c) 23:08:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 23:08:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 4) 23:08:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x240, @loopback}, 0x1c) 23:08:59 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 827.550899] FAULT_INJECTION: forcing a failure. [ 827.550899] name failslab, interval 1, probability 0, space 0, times 0 [ 827.553571] CPU: 1 PID: 6734 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 827.555121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 827.556989] Call Trace: [ 827.557603] dump_stack+0x107/0x167 [ 827.558435] should_fail.cold+0x5/0xa [ 827.559307] ? shmem_alloc_inode+0x18/0x40 [ 827.560260] should_failslab+0x5/0x20 [ 827.561116] kmem_cache_alloc+0x5b/0x310 [ 827.562041] ? shmem_destroy_inode+0x70/0x70 [ 827.563037] shmem_alloc_inode+0x18/0x40 [ 827.563951] ? shmem_destroy_inode+0x70/0x70 [ 827.564938] alloc_inode+0x63/0x240 [ 827.565772] new_inode+0x23/0x250 [ 827.566561] shmem_get_inode+0x15e/0xbc0 [ 827.567499] __shmem_file_setup+0xb8/0x320 [ 827.568459] ? _copy_from_user+0xfb/0x1b0 [ 827.569400] __do_sys_memfd_create+0x275/0x450 [ 827.570428] ? memfd_file_seals_ptr+0x170/0x170 [ 827.571481] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 827.572655] ? syscall_enter_from_user_mode+0x1d/0x50 [ 827.573841] do_syscall_64+0x33/0x40 [ 827.574695] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 827.575845] RIP: 0033:0x7f1739f10b19 [ 827.576688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 827.580817] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 827.582521] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 827.584134] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 827.585778] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 827.587269] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 827.588677] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 23:08:59 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 8) [ 827.625380] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 827.637774] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 827.653344] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 827.655753] FAULT_INJECTION: forcing a failure. [ 827.655753] name failslab, interval 1, probability 0, space 0, times 0 [ 827.658031] CPU: 1 PID: 6742 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 827.659394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 827.661053] Call Trace: [ 827.661596] dump_stack+0x107/0x167 [ 827.662335] should_fail.cold+0x5/0xa [ 827.663136] ? trace_hardirqs_on+0x5b/0x180 [ 827.664127] ? __alloc_skb+0x6d/0x5b0 [ 827.665000] should_failslab+0x5/0x20 [ 827.665883] kmem_cache_alloc_node+0x55/0x330 [ 827.666907] __alloc_skb+0x6d/0x5b0 [ 827.667746] __tcp_send_ack.part.0+0x67/0x650 [ 827.668770] tcp_send_ack+0x7d/0xa0 [ 827.669602] tcp_rcv_state_process+0x376c/0x4b20 [ 827.670685] ? mark_lock+0xf5/0x2df0 [ 827.671528] ? tcp_finish_connect+0x510/0x510 [ 827.672545] ? perf_trace_lock+0xac/0x490 [ 827.673493] ? perf_trace_preemptirq_template+0x26d/0x400 [ 827.674749] ? mark_held_locks+0x9e/0xe0 [ 827.675671] tcp_v6_do_rcv+0x3e4/0x1520 [ 827.676567] ? trace_hardirqs_on+0x5b/0x180 [ 827.677558] __release_sock+0x139/0x3b0 [ 827.678495] release_sock+0x54/0x1b0 [ 827.679254] __inet_stream_connect+0x5d0/0xe70 [ 827.680216] ? inet_init_net+0x590/0x590 [ 827.681050] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 827.682130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 827.683190] ? __local_bh_enable_ip+0x9d/0x100 [ 827.684116] inet_stream_connect+0x53/0xa0 [ 827.684992] ? __inet_stream_connect+0xe70/0xe70 [ 827.685972] __sys_connect_file+0x15b/0x1a0 [ 827.686867] __sys_connect+0x165/0x1a0 [ 827.687663] ? __sys_connect_file+0x1a0/0x1a0 [ 827.688594] ? __traceiter_irq_enable+0xc0/0xc0 [ 827.689566] ? __traceiter_irq_enable+0xc0/0xc0 [ 827.690514] ? fput_many+0x2f/0x1a0 [ 827.691274] ? trace_rcu_dyntick+0x2f/0x170 [ 827.692169] __x64_sys_connect+0x6f/0xb0 [ 827.692998] ? syscall_enter_from_user_mode+0x1d/0x50 [ 827.694075] do_syscall_64+0x33/0x40 [ 827.694843] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 827.695906] RIP: 0033:0x7f936cf2ab19 [ 827.696670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 827.700482] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 827.702037] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 827.703477] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 827.704926] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 827.706400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 827.707853] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 23:09:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) 23:09:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:09:17 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:09:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000300)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x14}}, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xcd0}}, './file1\x00'}) ioctl$TIOCNOTTY(r2, 0x5422) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "0070404651fd796ab47483a4c1be26133a48d389342f53cbb88cc2f96518c9ca6fb689bb56a2824f0f6fc853011e3c529931bbfdcfad732e9f6c146e67b6220c"}, 0x48, r3) keyctl$chown(0x4, r4, 0x0, 0x0) ppoll(&(0x7f0000000240)=[{0xffffffffffffffff, 0x82}, {r0, 0x8109}, {0xffffffffffffffff, 0x4}, {r0, 0x90}], 0x4, &(0x7f00000002c0), &(0x7f0000000440)={[0xb9]}, 0x8) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10}) 23:09:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x300, @loopback}, 0x1c) 23:09:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x1802, 0x0, @loopback}, 0x1c) 23:09:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 5) 23:09:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 9) 23:09:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 845.834896] FAULT_INJECTION: forcing a failure. [ 845.834896] name failslab, interval 1, probability 0, space 0, times 0 [ 845.837256] CPU: 1 PID: 6771 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 845.838672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 845.840352] Call Trace: [ 845.840895] dump_stack+0x107/0x167 [ 845.841652] should_fail.cold+0x5/0xa [ 845.842431] ? create_object.isra.0+0x3a/0xa20 [ 845.843354] should_failslab+0x5/0x20 [ 845.844121] kmem_cache_alloc+0x5b/0x310 [ 845.844943] create_object.isra.0+0x3a/0xa20 [ 845.845840] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 845.846864] kmem_cache_alloc+0x159/0x310 [ 845.847705] ? shmem_destroy_inode+0x70/0x70 [ 845.848590] shmem_alloc_inode+0x18/0x40 [ 845.849423] ? shmem_destroy_inode+0x70/0x70 [ 845.850332] alloc_inode+0x63/0x240 [ 845.851071] new_inode+0x23/0x250 [ 845.851775] shmem_get_inode+0x15e/0xbc0 23:09:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000, 0x0, @loopback}, 0x1c) [ 845.852613] __shmem_file_setup+0xb8/0x320 [ 845.853594] ? _copy_from_user+0xfb/0x1b0 [ 845.854440] __do_sys_memfd_create+0x275/0x450 [ 845.855355] ? memfd_file_seals_ptr+0x170/0x170 [ 845.856338] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 845.857422] ? syscall_enter_from_user_mode+0x1d/0x50 [ 845.858496] do_syscall_64+0x33/0x40 [ 845.859253] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 845.860286] RIP: 0033:0x7f1739f10b19 [ 845.861042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.864789] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 845.866334] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 845.867765] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 845.869195] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 845.870637] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 845.872064] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 [ 845.876713] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 845.914228] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 845.916734] FAULT_INJECTION: forcing a failure. [ 845.916734] name failslab, interval 1, probability 0, space 0, times 0 [ 845.916903] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 [ 845.919003] CPU: 0 PID: 6769 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 845.919020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 845.923900] Call Trace: [ 845.924427] dump_stack+0x107/0x167 [ 845.925165] should_fail.cold+0x5/0xa [ 845.925955] ? __wake_up_common_lock+0xde/0x140 [ 845.926881] ? create_object.isra.0+0x3a/0xa20 [ 845.927797] should_failslab+0x5/0x20 [ 845.928555] kmem_cache_alloc+0x5b/0x310 [ 845.929377] create_object.isra.0+0x3a/0xa20 [ 845.930261] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 845.931277] kmem_cache_alloc_node+0x169/0x330 [ 845.932198] __alloc_skb+0x6d/0x5b0 [ 845.932921] __tcp_send_ack.part.0+0x67/0x650 [ 845.933840] tcp_send_ack+0x7d/0xa0 [ 845.934566] tcp_rcv_state_process+0x376c/0x4b20 [ 845.935520] ? tcp_finish_connect+0x510/0x510 [ 845.936417] ? perf_trace_preemptirq_template+0x266/0x400 [ 845.937518] ? perf_trace_preemptirq_template+0x26d/0x400 [ 845.938657] ? mark_held_locks+0x9e/0xe0 [ 845.939491] tcp_v6_do_rcv+0x3e4/0x1520 [ 845.940276] ? trace_hardirqs_on+0x5b/0x180 [ 845.941147] __release_sock+0x139/0x3b0 [ 845.941965] release_sock+0x54/0x1b0 [ 845.942726] __inet_stream_connect+0x5d0/0xe70 [ 845.943649] ? inet_init_net+0x590/0x590 [ 845.944460] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 845.945480] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 845.946531] ? __local_bh_enable_ip+0x9d/0x100 [ 845.947458] inet_stream_connect+0x53/0xa0 [ 845.948302] ? __inet_stream_connect+0xe70/0xe70 [ 845.949244] __sys_connect_file+0x15b/0x1a0 [ 845.950121] __sys_connect+0x165/0x1a0 [ 845.950906] ? __sys_connect_file+0x1a0/0x1a0 [ 845.951807] ? __traceiter_irq_enable+0xc0/0xc0 [ 845.952733] ? __traceiter_irq_enable+0xc0/0xc0 [ 845.953673] ? fput_many+0x2f/0x1a0 [ 845.954405] ? trace_rcu_dyntick+0x2f/0x170 [ 845.955273] __x64_sys_connect+0x6f/0xb0 [ 845.956077] ? syscall_enter_from_user_mode+0x1d/0x50 [ 845.957100] do_syscall_64+0x33/0x40 [ 845.957860] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 845.958871] RIP: 0033:0x7f936cf2ab19 [ 845.959617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.963251] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 845.964754] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 845.966176] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 845.967580] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 845.968983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 845.970398] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 [ 845.980938] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 846.041219] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 23:09:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x3e8, @loopback}, 0x1c) 23:09:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:09:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4, 0x0, @loopback}, 0x1c) 23:09:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 10) 23:09:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 846.106931] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 846.108787] FAULT_INJECTION: forcing a failure. [ 846.108787] name failslab, interval 1, probability 0, space 0, times 0 [ 846.110520] CPU: 1 PID: 6783 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 846.111553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.112809] Call Trace: [ 846.113215] dump_stack+0x107/0x167 [ 846.113788] should_fail.cold+0x5/0xa [ 846.114371] should_failslab+0x5/0x20 [ 846.114949] __kmalloc_node_track_caller+0x74/0x3b0 [ 846.115708] ? __tcp_send_ack.part.0+0x67/0x650 [ 846.116424] __alloc_skb+0xb1/0x5b0 [ 846.116985] __tcp_send_ack.part.0+0x67/0x650 [ 846.117685] tcp_send_ack+0x7d/0xa0 [ 846.118240] tcp_rcv_state_process+0x376c/0x4b20 [ 846.118963] ? mark_lock+0xf5/0x2df0 [ 846.119525] ? tcp_finish_connect+0x510/0x510 [ 846.120179] ? perf_trace_lock+0xac/0x490 [ 846.120813] ? perf_trace_preemptirq_template+0x26d/0x400 [ 846.121696] ? mark_held_locks+0x9e/0xe0 [ 846.122314] tcp_v6_do_rcv+0x3e4/0x1520 [ 846.122916] ? trace_hardirqs_on+0x5b/0x180 [ 846.123569] __release_sock+0x139/0x3b0 [ 846.124186] release_sock+0x54/0x1b0 [ 846.124750] __inet_stream_connect+0x5d0/0xe70 [ 846.125446] ? inet_init_net+0x590/0x590 [ 846.126079] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 846.126852] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.127647] ? __local_bh_enable_ip+0x9d/0x100 [ 846.128339] inet_stream_connect+0x53/0xa0 [ 846.128977] ? __inet_stream_connect+0xe70/0xe70 [ 846.129709] __sys_connect_file+0x15b/0x1a0 [ 846.130364] __sys_connect+0x165/0x1a0 [ 846.130949] ? __sys_connect_file+0x1a0/0x1a0 [ 846.131634] ? __traceiter_irq_enable+0xc0/0xc0 [ 846.132346] ? __traceiter_irq_enable+0xc0/0xc0 [ 846.133066] ? fput_many+0x2f/0x1a0 [ 846.133644] ? trace_rcu_dyntick+0x2f/0x170 [ 846.134318] __x64_sys_connect+0x6f/0xb0 [ 846.134931] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.135710] do_syscall_64+0x33/0x40 [ 846.136279] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 846.137059] RIP: 0033:0x7f936cf2ab19 [ 846.137636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.140406] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 846.141565] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 846.142652] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 846.143744] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 846.144826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 846.145912] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 [ 846.161801] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:09:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 6) 23:09:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4002, 0x0, @loopback}, 0x1c) [ 846.180118] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 846.213942] FAULT_INJECTION: forcing a failure. [ 846.213942] name failslab, interval 1, probability 0, space 0, times 0 [ 846.215851] CPU: 1 PID: 6796 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 846.216935] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.218274] Call Trace: [ 846.218704] dump_stack+0x107/0x167 [ 846.219286] should_fail.cold+0x5/0xa [ 846.219911] ? security_inode_alloc+0x34/0x160 [ 846.220657] should_failslab+0x5/0x20 [ 846.221258] kmem_cache_alloc+0x5b/0x310 [ 846.221913] security_inode_alloc+0x34/0x160 [ 846.222604] inode_init_always+0xa4e/0xd10 [ 846.223265] ? shmem_destroy_inode+0x70/0x70 [ 846.223977] alloc_inode+0x84/0x240 [ 846.224583] new_inode+0x23/0x250 [ 846.225139] shmem_get_inode+0x15e/0xbc0 [ 846.225778] __shmem_file_setup+0xb8/0x320 [ 846.226440] ? _copy_from_user+0xfb/0x1b0 [ 846.227119] __do_sys_memfd_create+0x275/0x450 [ 846.227838] ? memfd_file_seals_ptr+0x170/0x170 [ 846.228563] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.229385] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.230232] do_syscall_64+0x33/0x40 [ 846.230839] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 846.231646] RIP: 0033:0x7f1739f10b19 [ 846.232227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.235222] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 846.236460] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 846.237617] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 846.238748] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 846.239862] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 846.241021] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 [ 861.392064] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:09:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:09:33 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:09:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 11) 23:09:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x500, @loopback}, 0x1c) 23:09:33 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000180)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x3, 0x0, 0x0, 0x2, 0x0, 0x3, 0x906, 0x6, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3, 0x9, 0x1, 0x7, 0x6, 0x1d99, 0x0, 0xf7e2}, 0x0, 0x10, r0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x381, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) syz_io_uring_setup(0x31dc, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0xb76, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000580)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r6, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x20004000}, 0x0) syz_io_uring_submit(r3, r5, &(0x7f0000000380)=@IORING_OP_TEE={0x21, 0x5, 0x0, @fd_index=0x4, 0x0, 0x0, 0x8, 0x9, 0x0, {0x0, 0x0, r1}}, 0x800) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000140)=""/204, 0xcc}, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$CDROMGETSPINDOWN(0xffffffffffffffff, 0x531d, &(0x7f0000000340)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000180)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000240)=""/228, 0xe4}], 0x1) 23:09:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x5, 0x0, @loopback}, 0x1c) 23:09:33 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x5000, 0x0, @loopback}, 0x1c) 23:09:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 7) [ 861.412663] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 861.415074] FAULT_INJECTION: forcing a failure. [ 861.415074] name failslab, interval 1, probability 0, space 0, times 0 [ 861.417315] CPU: 1 PID: 6816 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 861.418695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 861.420352] Call Trace: [ 861.420886] dump_stack+0x107/0x167 [ 861.421622] should_fail.cold+0x5/0xa [ 861.422383] ? create_object.isra.0+0x3a/0xa20 [ 861.423293] should_failslab+0x5/0x20 [ 861.424053] kmem_cache_alloc+0x5b/0x310 [ 861.424867] create_object.isra.0+0x3a/0xa20 [ 861.425749] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 861.426765] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 861.427766] ? __tcp_send_ack.part.0+0x67/0x650 [ 861.428693] __alloc_skb+0xb1/0x5b0 [ 861.429450] __tcp_send_ack.part.0+0x67/0x650 [ 861.430367] tcp_send_ack+0x7d/0xa0 [ 861.431104] tcp_rcv_state_process+0x376c/0x4b20 [ 861.432051] ? mark_lock+0xf5/0x2df0 [ 861.432787] ? tcp_finish_connect+0x510/0x510 [ 861.433677] ? perf_trace_lock+0xac/0x490 [ 861.434522] ? perf_trace_preemptirq_template+0x26d/0x400 [ 861.435626] ? mark_held_locks+0x9e/0xe0 [ 861.436439] tcp_v6_do_rcv+0x3e4/0x1520 [ 861.437248] ? trace_hardirqs_on+0x5b/0x180 [ 861.438122] __release_sock+0x139/0x3b0 [ 861.438922] release_sock+0x54/0x1b0 [ 861.439660] __inet_stream_connect+0x5d0/0xe70 [ 861.440580] ? inet_init_net+0x590/0x590 [ 861.441385] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 861.442419] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 861.443466] ? __local_bh_enable_ip+0x9d/0x100 [ 861.444507] inet_stream_connect+0x53/0xa0 [ 861.445343] ? __inet_stream_connect+0xe70/0xe70 [ 861.446297] __sys_connect_file+0x15b/0x1a0 [ 861.447161] __sys_connect+0x165/0x1a0 [ 861.447968] ? __sys_connect_file+0x1a0/0x1a0 [ 861.448864] ? __traceiter_irq_enable+0xc0/0xc0 [ 861.449871] ? __traceiter_irq_enable+0xc0/0xc0 [ 861.450801] ? fput_many+0x2f/0x1a0 [ 861.451556] ? trace_rcu_dyntick+0x2f/0x170 [ 861.452427] __x64_sys_connect+0x6f/0xb0 [ 861.453296] ? syscall_enter_from_user_mode+0x1d/0x50 [ 861.454345] do_syscall_64+0x33/0x40 [ 861.455136] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 861.456145] RIP: 0033:0x7f936cf2ab19 [ 861.456946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 861.460594] RSP: 002b:00007f936a4a0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 861.462182] RAX: ffffffffffffffda RBX: 00007f936d03df60 RCX: 00007f936cf2ab19 [ 861.463630] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000004 [ 861.465083] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 861.466544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 861.467988] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 [ 861.478951] FAULT_INJECTION: forcing a failure. [ 861.478951] name failslab, interval 1, probability 0, space 0, times 0 [ 861.481363] CPU: 1 PID: 6823 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 861.482732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 861.484393] Call Trace: [ 861.484917] dump_stack+0x107/0x167 [ 861.485662] should_fail.cold+0x5/0xa [ 861.486439] ? create_object.isra.0+0x3a/0xa20 [ 861.487369] should_failslab+0x5/0x20 [ 861.488130] kmem_cache_alloc+0x5b/0x310 [ 861.488962] create_object.isra.0+0x3a/0xa20 [ 861.489866] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 861.490890] kmem_cache_alloc+0x159/0x310 [ 861.491716] security_inode_alloc+0x34/0x160 [ 861.492602] inode_init_always+0xa4e/0xd10 [ 861.493444] ? shmem_destroy_inode+0x70/0x70 [ 861.494610] alloc_inode+0x84/0x240 [ 861.495506] new_inode+0x23/0x250 [ 861.496351] shmem_get_inode+0x15e/0xbc0 [ 861.497356] __shmem_file_setup+0xb8/0x320 [ 861.498388] ? _copy_from_user+0xfb/0x1b0 [ 861.499399] __do_sys_memfd_create+0x275/0x450 [ 861.500510] ? memfd_file_seals_ptr+0x170/0x170 [ 861.501662] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 861.502820] ? syscall_enter_from_user_mode+0x1d/0x50 [ 861.503858] do_syscall_64+0x33/0x40 [ 861.504616] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 861.505631] RIP: 0033:0x7f1739f10b19 [ 861.506401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 861.510058] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 861.511582] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 861.512998] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 861.514444] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 861.515872] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 861.517304] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 [ 861.520880] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:09:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x6, 0x0, @loopback}, 0x1c) 23:09:33 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x5e00, 0x0, @loopback}, 0x1c) 23:09:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:09:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x600, @loopback}, 0x1c) 23:09:33 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 861.614972] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 861.700108] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 861.716697] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:09:49 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:09:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 877.508501] FAULT_INJECTION: forcing a failure. [ 877.508501] name failslab, interval 1, probability 0, space 0, times 0 [ 877.510767] CPU: 1 PID: 6851 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 877.512109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 877.513747] Call Trace: [ 877.514279] dump_stack+0x107/0x167 [ 877.515000] should_fail.cold+0x5/0xa [ 877.515754] ? __d_alloc+0x2a/0x990 [ 877.516480] should_failslab+0x5/0x20 [ 877.517230] kmem_cache_alloc+0x5b/0x310 [ 877.518034] ? trace_hardirqs_on+0x5b/0x180 [ 877.518878] __d_alloc+0x2a/0x990 [ 877.519568] d_alloc_pseudo+0x19/0x70 [ 877.520302] alloc_file_pseudo+0xce/0x250 [ 877.521096] ? alloc_file+0x5a0/0x5a0 [ 877.521829] ? shmem_get_inode+0x55c/0xbc0 [ 877.522650] __shmem_file_setup+0x144/0x320 [ 877.523463] ? _copy_from_user+0xfb/0x1b0 [ 877.524249] __do_sys_memfd_create+0x275/0x450 [ 877.525113] ? memfd_file_seals_ptr+0x170/0x170 [ 877.526012] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 877.527001] ? syscall_enter_from_user_mode+0x1d/0x50 [ 877.527981] do_syscall_64+0x33/0x40 [ 877.528686] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 877.529653] RIP: 0033:0x7f1739f10b19 23:09:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x700, @loopback}, 0x1c) 23:09:49 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) (fail_nth: 12) 23:09:49 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x80fe, 0x0, @loopback}, 0x1c) 23:09:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 8) 23:09:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x7, 0x0, @loopback}, 0x1c) 23:09:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file1\x00', 0x600000, 0x1b2) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x7}}, 0x1c) fallocate(r2, 0x3, 0x52, 0x6) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x41) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x5f42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x12, r4, 0x0) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES32, @ANYRESHEX, @ANYRESOCT=r0, @ANYRES32=r1], 0x950) r5 = syz_open_dev$vcsa(&(0x7f0000000840), 0x401, 0x28180) ioctl$F2FS_IOC_GARBAGE_COLLECT(r5, 0x4004f506, &(0x7f0000000880)=0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x7f, 0x9, 0x0, 0x0, 0x2947, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffff046, 0x2}, 0x0, 0x7, 0xfc9, 0x2, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x0, 0x5}, 0x0, 0xe, r2, 0xa) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r7, &(0x7f00000000c0)="041a3a4985d424bdce9675f286982a09f7fe7569cb2c6e71f89e8019678c585aa70cc9e2d5613bb8bde96608eaf4af1834720900b040007af6d3edc14cd7ab81c733b614b0835ac6af8173be3b00015a826f2562ae98feb0d40000f80000", 0x5e, 0x3ff03) [ 877.530362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 877.534113] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 877.534860] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 877.535565] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 877.535576] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 877.535585] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 877.535595] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 877.535605] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 23:09:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, 0x0) [ 877.573728] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 877.589493] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 877.598140] FAULT_INJECTION: forcing a failure. [ 877.598140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 877.600800] CPU: 0 PID: 6855 Comm: syz-executor.6 Not tainted 5.10.200 #1 [ 877.602350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 877.604230] Call Trace: [ 877.604819] dump_stack+0x107/0x167 [ 877.605643] should_fail.cold+0x5/0xa [ 877.606501] _copy_to_user+0x2e/0x180 [ 877.607370] simple_read_from_buffer+0xcc/0x160 [ 877.608393] proc_fail_nth_read+0x198/0x230 [ 877.609370] ? proc_sessionid_read+0x230/0x230 [ 877.610387] ? security_file_permission+0x24e/0x570 [ 877.611514] ? perf_trace_initcall_start+0x101/0x380 [ 877.612641] ? proc_sessionid_read+0x230/0x230 [ 877.613805] vfs_read+0x228/0x580 [ 877.614671] ksys_read+0x12d/0x260 [ 877.615476] ? vfs_write+0xa70/0xa70 [ 877.616317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 877.617492] ? syscall_enter_from_user_mode+0x1d/0x50 [ 877.618668] do_syscall_64+0x33/0x40 [ 877.619502] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 877.620654] RIP: 0033:0x7f936cedd69c [ 877.621488] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 877.625648] RSP: 002b:00007f936a4a0170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 877.627344] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f936cedd69c [ 877.628921] RDX: 000000000000000f RSI: 00007f936a4a01e0 RDI: 0000000000000005 [ 877.630526] RBP: 00007f936a4a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 877.632107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 877.633684] R13: 00007ffd18c558af R14: 00007f936a4a0300 R15: 0000000000022000 23:09:49 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xc0fe, 0x0, @loopback}, 0x1c) 23:09:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x8, 0x0, @loopback}, 0x1c) 23:09:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 9) 23:09:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe00, @loopback}, 0x1c) 23:09:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, 0x0) [ 877.749109] FAULT_INJECTION: forcing a failure. [ 877.749109] name failslab, interval 1, probability 0, space 0, times 0 [ 877.751079] CPU: 1 PID: 6874 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 877.752206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 877.753561] Call Trace: [ 877.754003] dump_stack+0x107/0x167 [ 877.754610] should_fail.cold+0x5/0xa [ 877.755264] ? create_object.isra.0+0x3a/0xa20 [ 877.756057] should_failslab+0x5/0x20 [ 877.756739] kmem_cache_alloc+0x5b/0x310 [ 877.757464] create_object.isra.0+0x3a/0xa20 [ 877.758263] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 877.759157] kmem_cache_alloc+0x159/0x310 [ 877.759856] ? trace_hardirqs_on+0x5b/0x180 [ 877.760635] __d_alloc+0x2a/0x990 [ 877.761257] d_alloc_pseudo+0x19/0x70 [ 877.761881] alloc_file_pseudo+0xce/0x250 [ 877.762610] ? alloc_file+0x5a0/0x5a0 [ 877.763230] ? shmem_get_inode+0x55c/0xbc0 [ 877.763979] __shmem_file_setup+0x144/0x320 [ 877.764732] ? _copy_from_user+0xfb/0x1b0 [ 877.765470] __do_sys_memfd_create+0x275/0x450 [ 877.766277] ? memfd_file_seals_ptr+0x170/0x170 [ 877.767114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 877.768024] ? syscall_enter_from_user_mode+0x1d/0x50 [ 877.768939] do_syscall_64+0x33/0x40 [ 877.769601] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 877.770533] RIP: 0033:0x7f1739f10b19 [ 877.771201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 877.774454] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 877.775758] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 877.777003] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 877.778263] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 877.779508] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 877.780774] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 23:09:50 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xe803, 0x0, @loopback}, 0x1c) [ 877.806289] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 877.826041] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:09:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xe, 0x0, @loopback}, 0x1c) [ 877.945077] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:10:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xf401, 0x0, @loopback}, 0x1c) 23:10:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, 0x0) 23:10:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x1802, @loopback}, 0x1c) 23:10:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x50, 0x0, @loopback}, 0x1c) 23:10:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:10:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 10) [ 891.200738] FAULT_INJECTION: forcing a failure. [ 891.200738] name failslab, interval 1, probability 0, space 0, times 0 [ 891.202752] CPU: 1 PID: 6903 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 891.203920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 891.205506] Call Trace: [ 891.205968] dump_stack+0x107/0x167 [ 891.206582] should_fail.cold+0x5/0xa [ 891.207248] ? __alloc_file+0x21/0x320 [ 891.207914] should_failslab+0x5/0x20 [ 891.208573] kmem_cache_alloc+0x5b/0x310 [ 891.209279] __alloc_file+0x21/0x320 [ 891.209912] alloc_empty_file+0x6d/0x170 [ 891.210648] alloc_file+0x5e/0x5a0 [ 891.211234] alloc_file_pseudo+0x16a/0x250 [ 891.211930] ? alloc_file+0x5a0/0x5a0 23:10:03 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 891.212551] ? shmem_get_inode+0x55c/0xbc0 23:10:03 executing program 3: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000040)=0x6) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x90}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x35) fallocate(r1, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000d354592f9169227d00dcfdb1b0cbe10997fb1d3c5161d409834cdb040000002b72105b9bd2723975ef8c9b01627a2baf2108be493374cdda74a378bab5b298ad59f1"]) [ 891.213403] __shmem_file_setup+0x144/0x320 [ 891.214226] ? _copy_from_user+0xfb/0x1b0 [ 891.214902] __do_sys_memfd_create+0x275/0x450 [ 891.215645] ? memfd_file_seals_ptr+0x170/0x170 [ 891.216408] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 891.217256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 891.218096] do_syscall_64+0x33/0x40 [ 891.218722] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 891.219578] RIP: 0033:0x7f1739f10b19 [ 891.220233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.223444] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 891.224740] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 891.225963] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 891.226953] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 891.227234] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 891.227253] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 891.231762] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 [ 891.245797] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 891.294550] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:10:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 23:10:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfc00, 0x0, @loopback}, 0x1c) 23:10:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0x2, 0x4e20, 0x0, @loopback}, 0x1c) [ 891.354813] 9pnet: Insufficient options for proto=fd 23:10:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 23:10:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4000, @loopback}, 0x1c) 23:10:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfe80, 0x0, @loopback}, 0x1c) 23:10:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0x3, 0x4e20, 0x0, @loopback}, 0x1c) 23:10:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x5e, 0x0, @loopback}, 0x1c) [ 891.472826] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:10:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 11) 23:10:03 executing program 3: mount$9p_unix(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x20004, &(0x7f0000000380)={'trans=unix,', {[{@cache_loose}, {@privport}, {@access_client}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@uid_lt={'uid<', 0xffffffffffffffff}}, {@seclabel}]}}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) r2 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x1, 0xe9, 0x7, 0x9, 0x0, 0xffff, 0x38b04, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10000, 0x20, 0x20, 0x5, 0x80000001, 0x5, 0x9, 0x0, 0x8, 0x0, 0x800}, r2, 0x10, r3, 0x3) fchown(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)={0x250, 0x14, 0x501, 0x70bd27, 0x25dfdbfd, {0x2a, 0x5}, [@INET_DIAG_REQ_BYTECODE={0x35, 0x1, "03e732a577a4af5e6f7744633ccafdbc67a014117e823ecb8812f8775ce750f8bcaee5eb2e5f7b32ac021962431454bffd"}, @INET_DIAG_REQ_BYTECODE={0x51, 0x1, "469cd4bd1c61f708b02af7e86f31f79ec1635bd48744b7d6796c9c9a39ee141f2461c0e2d7ef36600f25c65a8e8ef708fdbdc23b8d20eccb40e644d7c1a748b2832e1c4f9689b6cce9a3d742e1"}, @INET_DIAG_REQ_BYTECODE={0xef, 0x1, "ce3eca012fcf780eacc3ecb19acdb4f67073839e766400e156a508068207404359d85c744eb964c52f6067dfb9090bf36a87877bc36c80bbacd440b80706f098857e5be7e9001ae81390a5fcf49064d13ae8ccf968f93667a62228a80030d6ea1a3b6755c99e2fabf2c91aab939343ce79c6369ef97e9e13d8a65e8eaf8735b345eb3ecb4c74c97ee3f2eb9ea5a90f0858114f48ee9d0232fe1be7d4f84d2f2ecfa7c3a5a8eecdc66599dc07cc436131f4b17b53aea2f3bd4798bb8bab41ec74f06312b416113c1e94fd3b34fdfdf25baacd0c8d077c1b8f564069a7b0dc3588631355eb3622e95175d169"}, @INET_DIAG_REQ_BYTECODE={0x23, 0x1, "2e2c0a0e5bb491e505f4991db3f21cbd78863b4252a5d9fb0832402e539062"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "b6eb460bbe7da9243a79b9e06ce36e8c307bfd50ca7834550583b7476f0f53633539a5fa8744b70f658947a582333ab124ae"}, @INET_DIAG_REQ_BYTECODE={0x61, 0x1, "f87a2bbf105899dd33c8c7e386fb863a2c99a9cd2afaff6ff880080ae6714e9c987273cf068aa55d4ff2eb9129235f83a5140c1595c23ec71537d70926fab28d5797227fb91650901bbf6c89031666a91425c4324ed33543d4c47d6154"}]}, 0x250}, 0x1, 0x0, 0x0, 0x8000}, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) [ 891.500415] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 891.543719] 9pnet: Insufficient options for proto=fd [ 891.595283] FAULT_INJECTION: forcing a failure. [ 891.595283] name failslab, interval 1, probability 0, space 0, times 0 [ 891.597714] CPU: 0 PID: 6940 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 891.599170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 891.600868] Call Trace: [ 891.601414] dump_stack+0x107/0x167 [ 891.602177] should_fail.cold+0x5/0xa [ 891.602962] ? create_object.isra.0+0x3a/0xa20 [ 891.603889] should_failslab+0x5/0x20 [ 891.604668] kmem_cache_alloc+0x5b/0x310 [ 891.605498] create_object.isra.0+0x3a/0xa20 [ 891.606408] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 891.607437] kmem_cache_alloc+0x159/0x310 [ 891.608283] __alloc_file+0x21/0x320 [ 891.609041] alloc_empty_file+0x6d/0x170 [ 891.609867] alloc_file+0x5e/0x5a0 [ 891.610612] alloc_file_pseudo+0x16a/0x250 [ 891.611471] ? alloc_file+0x5a0/0x5a0 [ 891.612255] ? shmem_get_inode+0x55c/0xbc0 [ 891.613124] __shmem_file_setup+0x144/0x320 [ 891.614011] ? _copy_from_user+0xfb/0x1b0 [ 891.614861] __do_sys_memfd_create+0x275/0x450 [ 891.615793] ? memfd_file_seals_ptr+0x170/0x170 [ 891.616743] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 891.617812] ? syscall_enter_from_user_mode+0x1d/0x50 [ 891.618881] do_syscall_64+0x33/0x40 [ 891.619643] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 891.620682] RIP: 0033:0x7f1739f10b19 [ 891.621440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.625166] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 891.626723] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 891.628160] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 891.629612] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 891.631072] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 891.632522] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 [ 891.804917] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:10:21 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:10:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfec0, 0x0, @loopback}, 0x1c) 23:10:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 12) 23:10:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 23:10:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0x7, 0x4e20, 0x0, @loopback}, 0x1c) 23:10:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfc, 0x0, @loopback}, 0x1c) 23:10:21 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r1, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r0, 0x0) 23:10:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4002, @loopback}, 0x1c) [ 909.018489] FAULT_INJECTION: forcing a failure. [ 909.018489] name failslab, interval 1, probability 0, space 0, times 0 [ 909.021263] CPU: 0 PID: 6966 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 909.021932] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 909.022933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.022940] Call Trace: [ 909.022962] dump_stack+0x107/0x167 [ 909.022990] should_fail.cold+0x5/0xa [ 909.028569] ? security_file_alloc+0x34/0x170 [ 909.029486] should_failslab+0x5/0x20 [ 909.030264] kmem_cache_alloc+0x5b/0x310 [ 909.031135] security_file_alloc+0x34/0x170 [ 909.032016] __alloc_file+0xb6/0x320 [ 909.032774] alloc_empty_file+0x6d/0x170 [ 909.033599] alloc_file+0x5e/0x5a0 [ 909.034326] alloc_file_pseudo+0x16a/0x250 [ 909.035227] ? alloc_file+0x5a0/0x5a0 [ 909.036009] ? shmem_get_inode+0x55c/0xbc0 [ 909.036885] __shmem_file_setup+0x144/0x320 [ 909.037759] ? _copy_from_user+0xfb/0x1b0 [ 909.038647] __do_sys_memfd_create+0x275/0x450 [ 909.039578] ? memfd_file_seals_ptr+0x170/0x170 [ 909.040528] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.041587] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.042670] do_syscall_64+0x33/0x40 [ 909.042958] 9pnet: Insufficient options for proto=fd [ 909.043429] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 909.043442] RIP: 0033:0x7f1739f10b19 [ 909.043468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.049908] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 909.051090] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 909.051490] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 909.051500] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 909.051511] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 909.051530] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 909.059108] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 23:10:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 23:10:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x1f4, 0x0, @loopback}, 0x1c) 23:10:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xe, 0x4e20, 0x0, @loopback}, 0x1c) 23:10:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xff00, 0x0, @loopback}, 0x1c) 23:10:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4800, @loopback}, 0x1c) [ 909.133148] 9pnet: Insufficient options for proto=fd 23:10:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 909.205803] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 909.218457] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 909.252121] 9pnet: Insufficient options for proto=fd 23:10:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 23:10:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x218, 0x0, @loopback}, 0x1c) [ 909.345533] 9pnet: Insufficient options for proto=fd 23:10:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0x10, 0x4e20, 0x0, @loopback}, 0x1c) 23:10:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xff0f, 0x0, @loopback}, 0x1c) 23:10:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5000, @loopback}, 0x1c) 23:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 13) 23:10:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x240, 0x0, @loopback}, 0x1c) 23:10:39 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r1 = getpgid(0x0) wait4(r1, &(0x7f00000001c0), 0x2, &(0x7f00000004c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') write$bt_hci(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0138202300000000301a5c8fec04000000c2c980c579b2fbca16e03bc3cad269f07df7b80528ac86b897bf324c8f047f59c4c71e66b5a235cc3e683f000000004400"/79], 0x27) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000003000/0x4000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000040)="ae19e9710b", 0x5, r2}, 0x68) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400010e, 0xc000) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000640)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0ffd29439a06000000000000001c1d1e1f202122232425262728292a2b2c2d2e2f2025fbb53435363738393a3b3c3d3e3f405c60c24d33c53ec7d97c570cc7eb7e9f3821450041b7f279bdf1acd68d1df22325ec445a3cdebc035a95229bf276942391fa3344dd65335dd235b80917862cd1fcad7832e67fc52fabbbee2622a731831ada03f46396b75240987af3b5e286eafddeae6cc506333fa310b3652f177e40f3e1a285e07e81098b46950fb39d9cd8ad2fde00008819f2bc2042f22c06b9a4b2f7adecde9510cdf7e1d2bd314f4108386a6e5d67b3e5a49ae8522bf4fc3bf98d061a73a592ff8a057555f802ee0b6c9147954229171a76b6bad0088f370cbe52b44572fd9f91676d2ae50784e3f9f53f7720480752cf6572d98827b1a4e7ffce781983f929b419ebbee0681f07"], 0x48, r3) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3) add_key$keyring(&(0x7f0000000240), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r3) socket$packet(0x11, 0x2, 0x300) wait4(0xffffffffffffffff, &(0x7f0000000180), 0x4, &(0x7f0000000380)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 23:10:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) (fail_nth: 1) 23:10:39 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r1, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r0, 0x0) [ 926.935252] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 926.947927] FAULT_INJECTION: forcing a failure. [ 926.947927] name failslab, interval 1, probability 0, space 0, times 0 [ 926.950488] CPU: 1 PID: 7018 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 926.951893] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 926.953603] Call Trace: [ 926.954145] dump_stack+0x107/0x167 [ 926.954904] should_fail.cold+0x5/0xa [ 926.955694] ? create_object.isra.0+0x3a/0xa20 [ 926.956631] should_failslab+0x5/0x20 [ 926.957412] kmem_cache_alloc+0x5b/0x310 [ 926.958253] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 926.959397] create_object.isra.0+0x3a/0xa20 [ 926.960284] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 926.961326] kmem_cache_alloc+0x159/0x310 [ 926.962170] security_file_alloc+0x34/0x170 [ 926.963053] __alloc_file+0xb6/0x320 [ 926.963812] alloc_empty_file+0x6d/0x170 [ 926.964648] alloc_file+0x5e/0x5a0 [ 926.965372] alloc_file_pseudo+0x16a/0x250 [ 926.966239] ? alloc_file+0x5a0/0x5a0 [ 926.967038] ? shmem_get_inode+0x55c/0xbc0 [ 926.967897] __shmem_file_setup+0x144/0x320 [ 926.968781] ? _copy_from_user+0xfb/0x1b0 [ 926.969640] __do_sys_memfd_create+0x275/0x450 [ 926.970585] ? memfd_file_seals_ptr+0x170/0x170 [ 926.971542] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 926.972622] ? syscall_enter_from_user_mode+0x1d/0x50 [ 926.973691] do_syscall_64+0x33/0x40 [ 926.974448] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 926.975494] RIP: 0033:0x7f1739f10b19 [ 926.976246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 926.980043] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 926.981581] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00007f1739f10b19 [ 926.983055] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007f1739f6a0fb [ 926.984516] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 926.985987] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 926.987455] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020014100 [ 927.005955] FAULT_INJECTION: forcing a failure. [ 927.005955] name failslab, interval 1, probability 0, space 0, times 0 [ 927.008333] CPU: 1 PID: 7016 Comm: syz-executor.4 Not tainted 5.10.200 #1 [ 927.009722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 927.011451] Call Trace: [ 927.012003] dump_stack+0x107/0x167 [ 927.012767] should_fail.cold+0x5/0xa [ 927.013575] should_failslab+0x5/0x20 [ 927.014371] __kmalloc_track_caller+0x79/0x370 [ 927.015326] ? strndup_user+0x74/0xe0 [ 927.016133] memdup_user+0x22/0xd0 [ 927.016871] strndup_user+0x74/0xe0 [ 927.017638] __x64_sys_mount+0x133/0x300 [ 927.018477] ? copy_mnt_ns+0xa00/0xa00 [ 927.019297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 927.020378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 927.021445] do_syscall_64+0x33/0x40 [ 927.022220] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 927.023290] RIP: 0033:0x7effb67a4b19 [ 927.024057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 927.027833] RSP: 002b:00007effb3d1a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 927.029396] RAX: ffffffffffffffda RBX: 00007effb68b7f60 RCX: 00007effb67a4b19 [ 927.030870] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 927.032332] RBP: 00007effb3d1a1d0 R08: 00000000200002c0 R09: 0000000000000000 [ 927.033794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 927.035279] R13: 00007ffe947efb9f R14: 00007effb3d1a300 R15: 0000000000022000 [ 927.106920] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:10:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:10:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x300, 0x0, @loopback}, 0x1c) 23:10:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 927.281772] Invalid option length (270) for dns_resolver key [ 927.324221] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 927.333456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:10:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5600, @loopback}, 0x1c) 23:10:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:10:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3e8, 0x0, @loopback}, 0x1c) 23:10:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x2, @loopback}, 0x1c) 23:10:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 14) [ 927.488048] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 927.495182] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:10:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:10:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x2, @loopback}, 0x1c) [ 927.580803] FAULT_INJECTION: forcing a failure. [ 927.580803] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 927.582706] CPU: 0 PID: 7047 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 927.583606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 927.584778] Call Trace: [ 927.585148] dump_stack+0x107/0x167 [ 927.585674] should_fail.cold+0x5/0xa [ 927.586223] __alloc_pages_nodemask+0x182/0x600 [ 927.586920] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 927.587784] ? lock_downgrade+0x6d0/0x6d0 [ 927.588373] ? lock_acquire+0x197/0x470 [ 927.588937] alloc_pages_vma+0xbb/0x410 [ 927.589496] shmem_alloc_page+0x10f/0x1e0 [ 927.590080] ? shmem_init_inode+0x20/0x20 [ 927.590653] ? percpu_counter_add_batch+0x8b/0x140 [ 927.591342] ? __vm_enough_memory+0x184/0x360 [ 927.591981] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 927.592184] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 927.592722] ? shmem_unuse_inode+0xf60/0xf60 [ 927.592757] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 927.596113] ? iov_iter_fault_in_readable+0x9a/0x410 [ 927.596823] shmem_write_begin+0xf7/0x1d0 [ 927.597406] generic_perform_write+0x20a/0x4f0 [ 927.598058] ? page_cache_prev_miss+0x310/0x310 [ 927.598722] ? evict_inodes+0x420/0x420 [ 927.599269] ? generic_write_checks+0x2ad/0x390 [ 927.599867] __generic_file_write_iter+0x39d/0x5d0 [ 927.600542] generic_file_write_iter+0xdb/0x230 [ 927.601125] ? iov_iter_init+0x3c/0x130 [ 927.601677] new_sync_write+0x42c/0x660 [ 927.602221] ? new_sync_read+0x6f0/0x6f0 [ 927.602752] ? __x64_sys_pwrite64+0x201/0x260 [ 927.603372] ? lock_release+0x680/0x680 [ 927.603884] ? selinux_file_permission+0x92/0x520 [ 927.604548] vfs_write+0x747/0xa70 [ 927.605017] __x64_sys_pwrite64+0x201/0x260 [ 927.605618] ? ksys_pwrite64+0x1b0/0x1b0 [ 927.606136] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 927.606870] ? syscall_enter_from_user_mode+0x1d/0x50 [ 927.607527] do_syscall_64+0x33/0x40 [ 927.608028] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 927.608670] RIP: 0033:0x7f1739ec3ab7 [ 927.609137] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 927.611238] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 927.611480] RSP: 002b:00007f1737485f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 927.611495] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3ab7 [ 927.611502] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 927.611520] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 927.617307] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 927.618219] R13: 0000000000000004 R14: 0000000020000080 R15: 0000000000000000 [ 927.741409] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 927.849758] Invalid option length (270) for dns_resolver key 23:10:54 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r1, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r0, 0x0) 23:10:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5e00, @loopback}, 0x1c) 23:10:54 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r1, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r0, 0x0) 23:10:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x7, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:10:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3, @loopback}, 0x1c) 23:10:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x500, 0x0, @loopback}, 0x1c) 23:10:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x3, @loopback}, 0x1c) 23:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 15) [ 942.069190] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 942.069267] FAULT_INJECTION: forcing a failure. [ 942.069267] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 942.073719] CPU: 0 PID: 7083 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 942.075126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 942.076822] Call Trace: [ 942.077370] dump_stack+0x107/0x167 [ 942.078130] should_fail.cold+0x5/0xa [ 942.078949] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 942.080038] ? shmem_write_begin+0xf7/0x1d0 [ 942.080913] ? shmem_write_begin+0x100/0x1d0 [ 942.081811] generic_perform_write+0x279/0x4f0 [ 942.082762] ? page_cache_prev_miss+0x310/0x310 [ 942.083717] ? evict_inodes+0x420/0x420 [ 942.084264] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 942.084529] ? generic_write_checks+0x2ad/0x390 [ 942.084564] __generic_file_write_iter+0x39d/0x5d0 [ 942.088409] generic_file_write_iter+0xdb/0x230 [ 942.089349] ? iov_iter_init+0x3c/0x130 [ 942.090163] new_sync_write+0x42c/0x660 [ 942.090984] ? new_sync_read+0x6f0/0x6f0 [ 942.091847] ? __x64_sys_pwrite64+0x201/0x260 [ 942.092761] ? lock_release+0x680/0x680 [ 942.093579] ? selinux_file_permission+0x92/0x520 [ 942.094583] vfs_write+0x747/0xa70 [ 942.095321] __x64_sys_pwrite64+0x201/0x260 [ 942.096196] ? ksys_pwrite64+0x1b0/0x1b0 [ 942.097032] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 942.098104] ? syscall_enter_from_user_mode+0x1d/0x50 [ 942.099190] do_syscall_64+0x33/0x40 [ 942.099954] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 942.100991] RIP: 0033:0x7f1739ec3ab7 [ 942.101743] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 942.105474] RSP: 002b:00007f1737485f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 942.107030] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3ab7 [ 942.108468] RDX: 000000000000003a RSI: 0000000020010000 RDI: 0000000000000004 [ 942.109904] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 942.111357] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 942.112796] R13: 0000000000000004 R14: 0000000020000080 R15: 0000000000000000 [ 942.122291] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:10:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x600, 0x0, @loopback}, 0x1c) 23:10:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) 23:10:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4, @loopback}, 0x1c) 23:10:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x80fe, @loopback}, 0x1c) 23:10:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 942.234674] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:10:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x700, 0x0, @loopback}, 0x1c) [ 942.266872] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 942.285025] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:10:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x9, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:10:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 942.333745] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:11:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:11:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @loopback}, 0x1c) 23:11:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:11:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5, @loopback}, 0x1c) 23:11:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xb8ff, @loopback}, 0x1c) 23:11:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xe00, 0x0, @loopback}, 0x1c) 23:11:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 16) 23:11:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x804, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_usb_connect$printer(0x6, 0x2d, &(0x7f0000000140)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x96, 0x50, 0x9, [{{0x9, 0x4, 0x0, 0x1f, 0x1, 0x7, 0x1, 0x3, 0xcb, "", {{{0x9, 0x5, 0x1, 0x2, 0x400, 0x3, 0x5, 0x40}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000180)={0xa, 0x6, 0x200, 0x8, 0x0, 0x4, 0x40, 0x7}, 0xf, &(0x7f00000002c0)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x7f, 0x9, 0x3ff}]}, 0x3, [{0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x816}}, {0xf1, &(0x7f0000000340)=@string={0xf1, 0x3, "046600166daa480f9c46dcd4540ae9340a2418293b299e9fb3fadb4bde8c2a9af99a2f7db65d00a52e9af3d60d9b8e0680aeb5066d9f3dad00a82fdc920099e0361c7be24c65580641c3867dd09a9974b169f8c455f76e7550c0bde5a9584dc1dd80063533002eb54a710556b6ff2f1539db999cdcd5001fede4cb56de326771ea6c7b531f483381fe391670788edabac475d5773ea78fd51f9665fd4a2af63028454ccce1f377ec4cc2ac00a9b9a2e487f45259e4ad44b6e1ac5aca891f08739257d8c0d64207452d37f44fa4fb9bed15699283cf305982e5499ae2240f05521c84a2364a4c41ebd0a676b4fedf17"}}, {0x7a, &(0x7f0000000440)=@string={0x7a, 0x3, "59ed4c0b7ba54a0a36c718440e16970a3c81c1e0c3aff380903e939ac0d078ed0e5016da21f4aa93ae67480efd88f74563dc1c4994075f362a4ca5d7b848ff82b92d1d9912be2e4c44f0f121c87883241bcaab2a78bcd63d323f2dc8b3611fcfe439d0a73ffe27078bada0e9eb6b7e07b5c2111183180724"}}]}) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r1, r1, 0x0, 0x3) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0xf50f, 0x0) r2 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r2) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x4040, 0x106) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 958.785518] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 958.791905] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 958.826481] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 958.840930] FAULT_INJECTION: forcing a failure. [ 958.840930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 958.843737] CPU: 0 PID: 7138 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 958.845255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 958.847145] Call Trace: [ 958.847728] dump_stack+0x107/0x167 [ 958.848544] should_fail.cold+0x5/0xa [ 958.849042] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 958.849390] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 958.849420] ? shmem_write_begin+0xf7/0x1d0 [ 958.849446] ? shmem_write_begin+0x100/0x1d0 [ 958.854487] generic_perform_write+0x279/0x4f0 [ 958.855536] ? page_cache_prev_miss+0x310/0x310 [ 958.856585] ? evict_inodes+0x420/0x420 [ 958.857494] ? generic_write_checks+0x2ad/0x390 [ 958.858537] __generic_file_write_iter+0x39d/0x5d0 [ 958.859671] generic_file_write_iter+0xdb/0x230 [ 958.860690] ? iov_iter_init+0x3c/0x130 [ 958.861589] new_sync_write+0x42c/0x660 [ 958.862461] ? new_sync_read+0x6f0/0x6f0 [ 958.863385] ? __x64_sys_pwrite64+0x201/0x260 [ 958.864371] ? lock_release+0x680/0x680 [ 958.865266] ? selinux_file_permission+0x92/0x520 [ 958.866355] vfs_write+0x747/0xa70 [ 958.867174] __x64_sys_pwrite64+0x201/0x260 [ 958.868135] ? ksys_pwrite64+0x1b0/0x1b0 [ 958.869046] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 958.870213] ? syscall_enter_from_user_mode+0x1d/0x50 [ 958.871377] do_syscall_64+0x33/0x40 [ 958.872207] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 958.873351] RIP: 0033:0x7f1739ec3ab7 [ 958.874182] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 958.878287] RSP: 002b:00007f1737485f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 958.879993] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3ab7 [ 958.881581] RDX: 0000000000000021 RSI: 0000000020000280 RDI: 0000000000000004 [ 958.883176] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 958.884764] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 958.886350] R13: 0000000000000004 R14: 0000000020000098 R15: 0000000000000001 23:11:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x1802, 0x0, @loopback}, 0x1c) 23:11:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @loopback}, 0x1c) 23:11:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 958.940159] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:11:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xc0fe, @loopback}, 0x1c) [ 958.959704] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:11:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x6, @loopback}, 0x1c) 23:11:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4000, 0x0, @loopback}, 0x1c) [ 959.032704] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 959.051543] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 959.086336] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:11:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) 23:11:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:11:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x67}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc69de45660031e8d}, {@in=@empty, 0x0, 0x32}, @in=@multicast1, {}, {}, {0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x80, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)={0x0, 0x0}) setpgid(0x0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write$binfmt_aout(r2, &(0x7f0000000b00)=ANY=[], 0x742) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) r3 = msgget(0x3, 0x202) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r4}, 0xc) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@report={0x68, 0x20, 0x4, 0x70bd25, 0x25dfdbfc, {0x32, {@in6=@remote, @in=@broadcast, 0x4e22, 0x0, 0x4e23, 0x4, 0x2, 0x20, 0xa0, 0x2b, r4, 0xee00}}, [@lastused={0xc, 0xf, 0x6}, @proto={0x5, 0x19, 0x33}, @extra_flags={0x8, 0x18, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x0) msgrcv(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000009006fe82620f90e524e45f800"/38], 0x26, 0x0, 0x3000) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000600)={0xe4, 0x10, 0x400, 0x70bd2b, 0x25dfdbfe, {0x20}, [@generic, @typed={0x8, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="9313106eb8e0a42b08561ffba7e76b46ce57c5a0ce4ed9940c23ef35f23030c447c68642999fd85f9cd574ba2f60b558e48b933f8ad952b401ae9910571f025c88eaa207a2038236bf525f5723aac642e96bb8e00999bc35b07f71535f7bd4021b998336aba6142afe7e64699235db1a775a5e83eb90e94873f0ca939f7a01d99c3a3b4d9a081d758edf234d07bdea0e71f52f0e996b4aebdd4a78152e55e98a3bd212b438a375fd5b6d399482b7e60bcaa422", @typed={0x14, 0x4d, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, 0xe4}, 0x1, 0x0, 0x0, 0xc010}, 0x20000800) msgsnd(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xeb, 0x800) sendmsg$NL80211_CMD_NEW_MPATH(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="001dff7f0000ffdbdf2517000000"], 0x14}, 0x1, 0x0, 0x0, 0x81}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) 23:11:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4002, 0x0, @loopback}, 0x1c) [ 977.735218] FAULT_INJECTION: forcing a failure. [ 977.735218] name failslab, interval 1, probability 0, space 0, times 0 [ 977.737134] CPU: 0 PID: 7176 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 977.738193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 977.739550] Call Trace: [ 977.739970] dump_stack+0x107/0x167 [ 977.740546] should_fail.cold+0x5/0xa [ 977.741144] ? getname_flags.part.0+0x50/0x4f0 [ 977.741862] should_failslab+0x5/0x20 [ 977.742477] kmem_cache_alloc+0x5b/0x310 [ 977.743130] getname_flags.part.0+0x50/0x4f0 [ 977.743839] getname+0x8e/0xd0 [ 977.744342] do_sys_openat2+0xf9/0x420 [ 977.744945] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 977.745721] ? build_open_flags+0x6f0/0x6f0 23:11:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe803, @loopback}, 0x1c) 23:11:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x7, @loopback}, 0x1c) 23:11:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 17) 23:11:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x10, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 977.746432] ? perf_trace_preemptirq_template+0x266/0x400 [ 977.747490] ? perf_trace_preemptirq_template+0x26d/0x400 [ 977.748390] ? perf_trace_preemptirq_template+0x26d/0x400 [ 977.749293] ? rcu_read_lock_any_held+0x75/0xa0 [ 977.750054] __x64_sys_openat+0x13f/0x1f0 [ 977.750769] ? __ia32_sys_open+0x1c0/0x1c0 [ 977.751489] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 977.752372] ? syscall_enter_from_user_mode+0x1d/0x50 [ 977.753217] do_syscall_64+0x33/0x40 [ 977.753816] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 977.754666] RIP: 0033:0x7f1739ec3a04 [ 977.755294] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 977.757816] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 977.758259] RSP: 002b:00007f1737485ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 977.758275] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3a04 [ 977.758283] RDX: 0000000000000002 RSI: 00007f1737486000 RDI: 00000000ffffff9c [ 977.758300] RBP: 00007f1737486000 R08: 0000000000000000 R09: ffffffffffffffff [ 977.765369] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 977.766553] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 [ 977.771962] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 977.785750] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:11:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @loopback}, 0x1c) 23:11:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x700, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 977.960171] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:11:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) [ 977.985891] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:11:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe, @loopback}, 0x1c) [ 978.030732] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:11:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xf401, @loopback}, 0x1c) 23:11:30 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:11:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x900, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:11:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 18) 23:11:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x5000, 0x0, @loopback}, 0x1c) [ 978.120278] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:11:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe, @loopback}, 0x1c) [ 978.146336] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 978.168258] FAULT_INJECTION: forcing a failure. [ 978.168258] name failslab, interval 1, probability 0, space 0, times 0 [ 978.170612] CPU: 1 PID: 7216 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 978.172011] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 978.173721] Call Trace: [ 978.174260] dump_stack+0x107/0x167 [ 978.175003] should_fail.cold+0x5/0xa [ 978.175805] ? create_object.isra.0+0x3a/0xa20 [ 978.176777] should_failslab+0x5/0x20 [ 978.177561] kmem_cache_alloc+0x5b/0x310 [ 978.178393] ? __generic_file_write_iter+0x1a4/0x5d0 [ 978.179467] create_object.isra.0+0x3a/0xa20 [ 978.180378] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 978.181470] kmem_cache_alloc+0x159/0x310 [ 978.182334] getname_flags.part.0+0x50/0x4f0 [ 978.183249] getname+0x8e/0xd0 [ 978.183933] do_sys_openat2+0xf9/0x420 [ 978.184733] ? build_open_flags+0x6f0/0x6f0 [ 978.185594] ? perf_trace_preemptirq_template+0x26d/0x400 [ 978.186682] ? perf_trace_preemptirq_template+0x26d/0x400 [ 978.187848] ? rcu_read_lock_any_held+0x75/0xa0 [ 978.188776] __x64_sys_openat+0x13f/0x1f0 [ 978.189602] ? __ia32_sys_open+0x1c0/0x1c0 [ 978.190453] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 978.191522] ? syscall_enter_from_user_mode+0x1d/0x50 [ 978.192652] do_syscall_64+0x33/0x40 [ 978.192844] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 978.193491] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 978.193506] RIP: 0033:0x7f1739ec3a04 [ 978.193529] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 978.200855] RSP: 002b:00007f1737485ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 978.202557] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3a04 [ 978.204208] RDX: 0000000000000002 RSI: 00007f1737486000 RDI: 00000000ffffff9c [ 978.205828] RBP: 00007f1737486000 R08: 0000000000000000 R09: ffffffffffffffff [ 978.207457] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 978.209038] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 23:11:30 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x4, 0x1002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x0, 0x5, 0x2}) r1 = io_uring_setup(0xd58, &(0x7f0000000bc0)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000240), 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x4801) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3f, 0x3f, 0x7, 0x7, 0x0, 0x60f, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0x7a9}, 0x40f0, 0x1, 0x334, 0x7, 0x0, 0x7, 0x7, 0x0, 0xffff, 0x0, 0x1}, 0x0, 0x8, r4, 0x8) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000d40)={{r5}, "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"}) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180), 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x22, &(0x7f0000000280)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000b00)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x23, 0x0, "91e05f77921609657a90c5b172eb47bfda35bff8788568b642bcea87a9be8237d130f84d84cf2c4771e1577906db7d0a3950d134e7dd5364f81a0dbb613cf332bb280e8e4d1ffc0d10e3d55e172d5235"}, 0xd8) creat(&(0x7f0000000040)='./file0\x00', 0x0) 23:11:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfc00, @loopback}, 0x1c) [ 978.225646] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 978.357789] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 994.662301] net_ratelimit: 2 callbacks suppressed [ 994.662315] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:11:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x50, @loopback}, 0x1c) 23:11:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfe80, @loopback}, 0x1c) 23:11:46 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:11:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 19) 23:11:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa00, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:11:46 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x48, @loopback}, 0x1c) 23:11:46 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:11:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x5e00, 0x0, @loopback}, 0x1c) [ 994.685628] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 994.692953] FAULT_INJECTION: forcing a failure. [ 994.692953] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 994.695324] CPU: 1 PID: 7249 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 994.696691] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 994.698306] Call Trace: [ 994.698821] dump_stack+0x107/0x167 [ 994.699549] should_fail.cold+0x5/0xa [ 994.700287] strncpy_from_user+0x34/0x470 [ 994.701093] getname_flags.part.0+0x95/0x4f0 [ 994.701949] getname+0x8e/0xd0 [ 994.702575] do_sys_openat2+0xf9/0x420 [ 994.703331] ? build_open_flags+0x6f0/0x6f0 [ 994.704180] ? perf_trace_preemptirq_template+0x26d/0x400 [ 994.705234] ? perf_trace_preemptirq_template+0x26d/0x400 [ 994.706289] ? rcu_read_lock_any_held+0x75/0xa0 [ 994.707189] __x64_sys_openat+0x13f/0x1f0 [ 994.708018] ? __ia32_sys_open+0x1c0/0x1c0 [ 994.708849] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 994.709878] ? syscall_enter_from_user_mode+0x1d/0x50 [ 994.710884] do_syscall_64+0x33/0x40 [ 994.711624] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 994.712642] RIP: 0033:0x7f1739ec3a04 [ 994.713381] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 994.716971] RSP: 002b:00007f1737485ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 994.718610] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3a04 [ 994.720194] RDX: 0000000000000002 RSI: 00007f1737486000 RDI: 00000000ffffff9c [ 994.721768] RBP: 00007f1737486000 R08: 0000000000000000 R09: ffffffffffffffff [ 994.723009] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 994.723337] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 994.723357] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 [ 994.765347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:11:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5e, @loopback}, 0x1c) 23:11:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfec0, @loopback}, 0x1c) 23:11:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb00, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:11:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x50, @loopback}, 0x1c) [ 994.862661] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 994.912050] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 994.925695] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x80fe, 0x0, @loopback}, 0x1c) 23:12:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x56, @loopback}, 0x1c) 23:12:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1020, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:12:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xff00, @loopback}, 0x1c) 23:12:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc, @loopback}, 0x1c) 23:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 20) 23:12:04 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:12:04 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1012.179903] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1012.189964] FAULT_INJECTION: forcing a failure. [ 1012.189964] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.191756] CPU: 0 PID: 7295 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 1012.192837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.194133] Call Trace: [ 1012.194553] dump_stack+0x107/0x167 [ 1012.195127] should_fail.cold+0x5/0xa [ 1012.195744] ? __alloc_file+0x21/0x320 [ 1012.196357] should_failslab+0x5/0x20 [ 1012.196941] kmem_cache_alloc+0x5b/0x310 [ 1012.197574] __alloc_file+0x21/0x320 [ 1012.198148] alloc_empty_file+0x6d/0x170 [ 1012.198772] path_openat+0xe3/0x26f0 [ 1012.199350] ? path_lookupat+0x860/0x860 [ 1012.199973] ? perf_trace_lock+0xac/0x490 [ 1012.200609] ? lock_acquire+0x197/0x470 [ 1012.201214] ? __lockdep_reset_lock+0x180/0x180 [ 1012.201958] do_filp_open+0x190/0x3e0 [ 1012.202555] ? may_open_dev+0xf0/0xf0 [ 1012.203172] ? __alloc_fd+0x2b8/0x630 [ 1012.203753] ? lock_downgrade+0x6d0/0x6d0 [ 1012.204407] ? do_raw_spin_lock+0x121/0x260 [ 1012.205085] ? rwlock_bug.part.0+0x90/0x90 [ 1012.205740] ? _raw_spin_unlock+0x1a/0x30 [ 1012.206373] ? __alloc_fd+0x2b8/0x630 [ 1012.206954] do_sys_openat2+0x171/0x420 [ 1012.207585] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1012.208354] ? build_open_flags+0x6f0/0x6f0 [ 1012.209009] ? perf_trace_preemptirq_template+0x266/0x400 [ 1012.209826] ? perf_trace_preemptirq_template+0x26d/0x400 [ 1012.210647] ? perf_trace_preemptirq_template+0x26d/0x400 [ 1012.211471] ? rcu_read_lock_any_held+0x75/0xa0 [ 1012.212168] __x64_sys_openat+0x13f/0x1f0 [ 1012.212786] ? __ia32_sys_open+0x1c0/0x1c0 [ 1012.213223] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1012.213418] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1012.213431] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1012.213451] do_syscall_64+0x33/0x40 [ 1012.213475] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1012.218531] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1012.218691] RIP: 0033:0x7f1739ec3a04 [ 1012.218713] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1012.224642] RSP: 002b:00007f1737485ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1012.225873] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3a04 [ 1012.227019] RDX: 0000000000000002 RSI: 00007f1737486000 RDI: 00000000ffffff9c [ 1012.228146] RBP: 00007f1737486000 R08: 0000000000000000 R09: ffffffffffffffff [ 1012.229278] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1012.230383] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 [ 1012.235772] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xc0fe, 0x0, @loopback}, 0x1c) 23:12:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x1f4, @loopback}, 0x1c) 23:12:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:12:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xff0f, @loopback}, 0x1c) 23:12:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5e, @loopback}, 0x1c) 23:12:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xe803, 0x0, @loopback}, 0x1c) [ 1012.429490] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1012.443478] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x218, @loopback}, 0x1c) [ 1012.585333] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1012.599918] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xffb8, @loopback}, 0x1c) 23:12:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfc, @loopback}, 0x1c) [ 1028.189914] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1028.199905] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:20 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:12:20 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1028.219143] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1028.225179] FAULT_INJECTION: forcing a failure. [ 1028.225179] name failslab, interval 1, probability 0, space 0, times 0 [ 1028.227682] CPU: 1 PID: 7339 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 1028.229220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1028.231055] Call Trace: [ 1028.231634] dump_stack+0x107/0x167 [ 1028.232427] should_fail.cold+0x5/0xa [ 1028.233266] ? create_object.isra.0+0x3a/0xa20 [ 1028.234306] should_failslab+0x5/0x20 [ 1028.235165] kmem_cache_alloc+0x5b/0x310 [ 1028.236077] create_object.isra.0+0x3a/0xa20 [ 1028.237049] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1028.238144] kmem_cache_alloc+0x159/0x310 [ 1028.239051] __alloc_file+0x21/0x320 [ 1028.239861] alloc_empty_file+0x6d/0x170 [ 1028.240772] path_openat+0xe3/0x26f0 [ 1028.241594] ? path_lookupat+0x860/0x860 23:12:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2010, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 21) 23:12:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xf401, 0x0, @loopback}, 0x1c) 23:12:20 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x240, @loopback}, 0x1c) [ 1028.242478] ? perf_trace_lock+0xac/0x490 [ 1028.243513] ? lock_acquire+0x197/0x470 [ 1028.244437] ? __lockdep_reset_lock+0x180/0x180 [ 1028.245483] do_filp_open+0x190/0x3e0 [ 1028.246328] ? may_open_dev+0xf0/0xf0 [ 1028.247187] ? __alloc_fd+0x2b8/0x630 [ 1028.248045] ? lock_downgrade+0x6d0/0x6d0 [ 1028.248992] ? do_raw_spin_lock+0x121/0x260 [ 1028.249953] ? rwlock_bug.part.0+0x90/0x90 [ 1028.250917] ? _raw_spin_unlock+0x1a/0x30 [ 1028.251839] ? __alloc_fd+0x2b8/0x630 [ 1028.252702] do_sys_openat2+0x171/0x420 [ 1028.253572] ? build_open_flags+0x6f0/0x6f0 [ 1028.254555] ? perf_trace_preemptirq_template+0x26d/0x400 [ 1028.255755] ? perf_trace_preemptirq_template+0x26d/0x400 [ 1028.256968] ? rcu_read_lock_any_held+0x75/0xa0 [ 1028.257996] __x64_sys_openat+0x13f/0x1f0 [ 1028.258917] ? __ia32_sys_open+0x1c0/0x1c0 [ 1028.259859] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1028.261007] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1028.262134] do_syscall_64+0x33/0x40 [ 1028.262954] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1028.264097] RIP: 0033:0x7f1739ec3a04 [ 1028.264910] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1028.268960] RSP: 002b:00007f1737485ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1028.270617] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3a04 [ 1028.272181] RDX: 0000000000000002 RSI: 00007f1737486000 RDI: 00000000ffffff9c [ 1028.273736] RBP: 00007f1737486000 R08: 0000000000000000 R09: ffffffffffffffff [ 1028.275315] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1028.276897] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 [ 1028.293264] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x20000, @loopback}, 0x1c) 23:12:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x1f4, @loopback}, 0x1c) 23:12:20 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x300, @loopback}, 0x1c) 23:12:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xedc0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:12:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfc00, 0x0, @loopback}, 0x1c) [ 1028.400196] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1028.412455] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1028.419042] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1028.428435] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1028.491548] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:12:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x218, @loopback}, 0x1c) 23:12:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x1000000, @loopback}, 0x1c) [ 1028.536000] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1028.542563] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:20 executing program 3: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x90101, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat2(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x444002, 0x2}, 0x18) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {0x77359400}}) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000280), 0x561001, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000f80)='./file1\x00', 0x400, 0x0) perf_event_open(&(0x7f0000000fc0)={0x7, 0x80, 0x6d, 0x80, 0x3f, 0x1, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x1, @perf_bp={&(0x7f00000002c0), 0xf}, 0x40, 0x2, 0x6, 0x5, 0x20, 0x5, 0x3f, 0x0, 0x9, 0x0, 0x400}, 0xffffffffffffffff, 0x5, r2, 0xb) r4 = fsmount(0xffffffffffffffff, 0x1, 0x71) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000f40)=ANY=[@ANYBLOB="09e57afd2820f38e830000255237d2b5d0ae777c27be00b016e61650933c345e8853bd96323cf885041d", @ANYRES32, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) dup2(r3, 0xffffffffffffffff) ioctl$BTRFS_IOC_DEV_REPLACE(r4, 0xca289435, &(0x7f0000000500)={0x1, 0x9, @start={0x0, 0x1, "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", "e5395dcee97031225b420fd4d7323c059a4a0b358a633d091a2326dfb217b243c37434f3c6a588af0c91cb126c9779eea3b72e3cf38052885070d9530f0eca8fcccf3aca70a508535365014bb737408ba2d2ff8e817bbacb5a96725dbb92ebe460a67220e314d736c476c5fd6218e8ba88ea0e7c28f58377b0d4ba6d6f559cb0e06be48ba40b7218631f7187e2a0162e6c1fbc9c0bb07f9cda07b37d11b086a18133dbf16471ee8ef221cde6a17afd98ec03cdd168cc908c8d94c4824d5573f6d5437a632c0467620f3000f7b982086fecbe34e0ced15499dfcb7edc78a7a8e3f742c98989dd7bc170e4e239e6432947e8183f4a4e399a0c3f0e879de125aef7dc1530acf3e645b03c043095dffa59c05ece7a4e508b90d2ed9bd69211e82e3e7e63ac39612bfd25e9765177b4b169d2f57150e7bedf5b492147014fa41998cc9a589233beec4217af4c82565d5a222ecc38ec12ff03d44da32aaad5dbd2eb488beaa00fed49d55d790eecccad58775d3188c2fd6430f77e570115246a9b00eafb872de2cbcb6da244d3eccf3a7209a01c97d3e2eead6c4fb83a13a6398f7e2e9f039c67f8a90aad0467fc75b9778def95286231cdd575121cc9f477d56ef176dac6f15805f828e5d9a41492da3d573e180530a550a9101be058ead9519217cd7f7db7caafaff0e0488c30f63a68071db5731014173710ae99456d74b6f10c01c58d1a5f60cfe4e3c99aaee653c7e49ce1c2fb695722e453890b7427e454875f0e84a9a97aa8d6fd31e42f6edcf7dcbde113235cad50c7702723ce55d2bf31e6b11636a9a0e67ac938c61525772ef45ce8db1359441637b93b0a51461105a408672a07d68230262f8fb3fe810818d8859297202a722b53ef819fee9fe3609b3bd1667c89a3ece00410221482bce389a4a22ac421621d54bd131e26fbdd0502d57056624387f601bfb4ba86cade7a1a21009f911ee2b375644377c4b707a45cee9508484645a50c3989e2c75790bd297a61e9421a4e8870d8ba941183e877ee37aafc90d4b1c2c1743b51dfcd7a68c183ed3b1ac27b2e4ccbe8fb0a42a6c00a89519165758505c603d0662c0eeeb389f805935f822bf05c71788d1dfb3bc7bdb9e05b26286ebe84f4848a032daaecc3731d4265777bcf42b6c8b0c1a81684dad400aa9dac39281137540a5db499fc0719fff16185e33af3bad7bf63f64b2525d072198807408ac774be6b9f30416ac603d6e2785761130313cb66450f69365656e93fd1825570503c65d217a3504d3390ac224d3a68fe35014c1172b89b54af23fc355d830da535030995748455ff33ce0d5d6961475b44a5e95f90629dc9c2a60ca0ae7f67b810ee733043720f7f028d775805ac763d23633b9e0631f291a824018ecb0ee6bb2ab4aba6634cf6f1180acf7edf7e821d127aaf4ef8185cf8966087"}, [0x100000000, 0x3ff, 0x6, 0x0, 0x0, 0x8001, 0x3ff, 0x3f, 0x7, 0x27a, 0x10001, 0x4, 0x8001, 0x7c1b, 0xfff, 0x3, 0x80, 0x1, 0x8, 0x101, 0x7fffffff, 0x8, 0x400, 0x7, 0x2, 0x9, 0x0, 0x0, 0x4, 0x2, 0x7fff, 0x8, 0x0, 0x117e, 0x7ff, 0xfffffffffffffffd, 0x7, 0x10001, 0xd56, 0x7, 0xa58f, 0x8, 0x400, 0x700000000, 0x7, 0xfffffffffffff801, 0x1, 0x87, 0xd6e3, 0x8, 0x6, 0x4, 0x6, 0xfffffffffffffff8, 0x6, 0x2, 0xffffffff, 0xffffffffffffff01, 0x9d36, 0x0, 0x800001ff, 0xfde3, 0x0, 0x7]}) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r4, 0x3312, 0xffff) mq_open(&(0x7f0000005c00)='-@\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001040)) mount$cgroup(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x2812020, &(0x7f0000000400)={[{@name={'name', 0x3d, '/dev/snapshot\x00'}}, {@cpuset_v2_mode}, {}, {@none}, {@xattr}, {@noprefix}, {@clone_children}, {@subsystem='hugetlb'}], [{@fsname={'fsname', 0x3d, '/dev/zero\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '.(+-^'}}, {@obj_role={'obj_role', 0x3d, '^('}}]}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000300)={{0x1, 0x1, 0x18, r4, @out_args}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f00000004c0)={0x20000002}) [ 1028.622492] cgroup: Invalid name [ 1028.629898] cgroup: Invalid name [ 1043.517301] FAULT_INJECTION: forcing a failure. [ 1043.517301] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.521902] CPU: 0 PID: 7385 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 1043.523303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1043.525009] Call Trace: [ 1043.525547] dump_stack+0x107/0x167 [ 1043.526310] should_fail.cold+0x5/0xa [ 1043.527107] ? security_file_alloc+0x34/0x170 [ 1043.528015] ? security_file_alloc+0x34/0x170 [ 1043.528938] should_failslab+0x5/0x20 [ 1043.529698] kmem_cache_alloc+0x5b/0x310 [ 1043.530544] security_file_alloc+0x34/0x170 [ 1043.531441] __alloc_file+0xb6/0x320 [ 1043.532223] alloc_empty_file+0x6d/0x170 [ 1043.533048] path_openat+0xe3/0x26f0 [ 1043.533815] ? path_lookupat+0x860/0x860 [ 1043.534647] ? perf_trace_lock+0xac/0x490 [ 1043.535496] ? lock_acquire+0x197/0x470 [ 1043.536319] ? __lockdep_reset_lock+0x180/0x180 [ 1043.537258] do_filp_open+0x190/0x3e0 [ 1043.538045] ? may_open_dev+0xf0/0xf0 [ 1043.538805] ? __alloc_fd+0x2b8/0x630 [ 1043.539586] ? lock_downgrade+0x6d0/0x6d0 [ 1043.540459] ? do_raw_spin_lock+0x121/0x260 [ 1043.541326] ? rwlock_bug.part.0+0x90/0x90 [ 1043.542194] ? _raw_spin_unlock+0x1a/0x30 [ 1043.543031] ? __alloc_fd+0x2b8/0x630 [ 1043.543795] do_sys_openat2+0x171/0x420 [ 1043.544597] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1043.545431] net_ratelimit: 2 callbacks suppressed [ 1043.545446] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1043.545593] ? build_open_flags+0x6f0/0x6f0 [ 1043.549396] ? perf_trace_preemptirq_template+0x266/0x400 [ 1043.550518] ? perf_trace_preemptirq_template+0x26d/0x400 [ 1043.551609] ? perf_trace_preemptirq_template+0x26d/0x400 [ 1043.552740] ? rcu_read_lock_any_held+0x75/0xa0 [ 1043.553687] __x64_sys_openat+0x13f/0x1f0 [ 1043.554529] ? __ia32_sys_open+0x1c0/0x1c0 [ 1043.555402] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1043.556480] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1043.557511] do_syscall_64+0x33/0x40 [ 1043.557582] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1043.558270] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1043.561272] RIP: 0033:0x7f1739ec3a04 [ 1043.562033] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1043.565694] RSP: 002b:00007f1737485ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1043.567220] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3a04 [ 1043.568641] RDX: 0000000000000002 RSI: 00007f1737486000 RDI: 00000000ffffff9c [ 1043.570069] RBP: 00007f1737486000 R08: 0000000000000000 R09: ffffffffffffffff [ 1043.571471] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1043.572916] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 23:12:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfe80, 0x0, @loopback}, 0x1c) 23:12:35 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:12:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x240, @loopback}, 0x1c) 23:12:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x80000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:12:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3e8, @loopback}, 0x1c) 23:12:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x2000000, @loopback}, 0x1c) 23:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 22) 23:12:35 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f00000000c0)=""/35, 0x23}, {&(0x7f0000000340)=""/240, 0xf0}], 0x3) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xffffffff, 0x3, 0xffffffe0, 0x0, 0x4, "c0ec73d3040173ed79ab08d2d33a5ce3a3f714", 0x40, 0x2}) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00'}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000240)=r5) ioctl$FITHAW(r4, 0xc0045878) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r1, 0x58aa, 0x9116, 0x2, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @empty, @dev}, &(0x7f0000000440)=0xc) [ 1043.600077] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x500, @loopback}, 0x1c) [ 1043.624120] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:12:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfec0, 0x0, @loopback}, 0x1c) 23:12:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x300, @loopback}, 0x1c) 23:12:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x3000000, @loopback}, 0x1c) [ 1043.737487] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1043.745377] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1043.762095] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1043.771860] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4000000, @loopback}, 0x1c) 23:12:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x600, @loopback}, 0x1c) 23:12:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x105142, 0x0) r2 = inotify_init1(0x80800) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) inotify_rm_watch(r3, 0x0) fadvise64(r2, 0x5e1, 0x100000001, 0x2) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @private=0xa010100}, 0xc) preadv(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r1) lseek(r1, 0x800, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x400, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x100000001) 23:12:51 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1059.476716] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xff00, 0x0, @loopback}, 0x1c) 23:12:51 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x3e8, @loopback}, 0x1c) 23:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 23) 23:12:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1059.520878] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1059.532293] FAULT_INJECTION: forcing a failure. [ 1059.532293] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.534761] CPU: 1 PID: 7442 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 1059.536126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1059.537805] Call Trace: [ 1059.538334] dump_stack+0x107/0x167 [ 1059.539070] should_fail.cold+0x5/0xa [ 1059.539835] ? security_file_alloc+0x34/0x170 23:12:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x700, @loopback}, 0x1c) [ 1059.540746] should_failslab+0x5/0x20 [ 1059.541628] kmem_cache_alloc+0x5b/0x310 [ 1059.542457] security_file_alloc+0x34/0x170 [ 1059.543322] __alloc_file+0xb6/0x320 [ 1059.544066] alloc_empty_file+0x6d/0x170 [ 1059.544896] path_openat+0xe3/0x26f0 [ 1059.545644] ? path_lookupat+0x860/0x860 [ 1059.546455] ? perf_trace_lock+0xac/0x490 [ 1059.547279] ? lock_acquire+0x197/0x470 [ 1059.548072] ? __lockdep_reset_lock+0x180/0x180 [ 1059.549009] do_filp_open+0x190/0x3e0 [ 1059.549761] ? may_open_dev+0xf0/0xf0 [ 1059.549783] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1059.550683] ? __alloc_fd+0x2b8/0x630 [ 1059.550713] ? lock_downgrade+0x6d0/0x6d0 [ 1059.554568] ? do_raw_spin_lock+0x121/0x260 [ 1059.555595] ? rwlock_bug.part.0+0x90/0x90 [ 1059.556638] ? _raw_spin_unlock+0x1a/0x30 [ 1059.557619] ? __alloc_fd+0x2b8/0x630 [ 1059.558523] do_sys_openat2+0x171/0x420 [ 1059.559335] ? build_open_flags+0x6f0/0x6f0 [ 1059.560205] ? perf_trace_preemptirq_template+0x26d/0x400 [ 1059.561318] ? perf_trace_preemptirq_template+0x26d/0x400 [ 1059.562409] ? rcu_read_lock_any_held+0x75/0xa0 [ 1059.563354] __x64_sys_openat+0x13f/0x1f0 [ 1059.564180] ? __ia32_sys_open+0x1c0/0x1c0 [ 1059.565058] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1059.566100] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1059.567163] do_syscall_64+0x33/0x40 [ 1059.567928] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1059.568960] RIP: 0033:0x7f1739ec3a04 [ 1059.569703] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1059.573359] RSP: 002b:00007f1737485ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1059.574870] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739ec3a04 [ 1059.576304] RDX: 0000000000000002 RSI: 00007f1737486000 RDI: 00000000ffffff9c [ 1059.577718] RBP: 00007f1737486000 R08: 0000000000000000 R09: ffffffffffffffff [ 1059.579135] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1059.580558] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 23:12:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5000000, @loopback}, 0x1c) [ 1059.709155] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:51 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x500, @loopback}, 0x1c) [ 1059.723820] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x7000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:12:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe00, @loopback}, 0x1c) 23:12:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xff0f, 0x0, @loopback}, 0x1c) [ 1059.763352] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1059.778479] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6000000, @loopback}, 0x1c) 23:12:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 24) [ 1059.922190] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:12:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 1059.944724] FAULT_INJECTION: forcing a failure. [ 1059.944724] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.947321] CPU: 1 PID: 7473 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 1059.948744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1059.950454] Call Trace: [ 1059.950988] dump_stack+0x107/0x167 [ 1059.951749] should_fail.cold+0x5/0xa [ 1059.952544] ? __kthread_create_on_node+0xd1/0x400 [ 1059.953552] should_failslab+0x5/0x20 [ 1059.954340] kmem_cache_alloc_trace+0x55/0x320 [ 1059.955270] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1059.956252] __kthread_create_on_node+0xd1/0x400 [ 1059.957218] ? __kthread_parkme+0x1d0/0x1d0 [ 1059.958112] ? __mutex_lock+0x4fe/0x10b0 [ 1059.958935] ? loop_configure+0xcb5/0x1480 [ 1059.959789] ? do_raw_spin_unlock+0x4f/0x220 [ 1059.960693] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1059.961653] kthread_create_on_node+0xbb/0x100 [ 1059.962579] ? __kthread_create_on_node+0x400/0x400 [ 1059.963591] ? lockdep_init_map_type+0x2c7/0x780 [ 1059.964568] ? lockdep_init_map_type+0x2c7/0x780 [ 1059.965533] loop_configure+0x3e3/0x1480 [ 1059.966362] lo_ioctl+0xa72/0x1760 [ 1059.967189] ? avc_has_extended_perms+0x7f1/0xf40 [ 1059.968182] ? loop_set_status_old+0x250/0x250 [ 1059.969135] ? avc_ss_reset+0x180/0x180 [ 1059.970071] ? lock_acquire+0x197/0x470 [ 1059.970891] ? find_held_lock+0x2c/0x110 [ 1059.971810] ? __traceiter_irq_enable+0xc0/0xc0 [ 1059.972822] ? __lock_acquire+0xbb1/0x5b00 [ 1059.973745] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1059.974799] ? generic_block_fiemap+0x60/0x60 [ 1059.975708] ? loop_set_status_old+0x250/0x250 [ 1059.976635] blkdev_ioctl+0x291/0x710 [ 1059.977403] ? blkdev_common_ioctl+0x1870/0x1870 [ 1059.978353] ? selinux_file_ioctl+0xb6/0x270 [ 1059.979252] block_ioctl+0xf9/0x140 [ 1059.979983] ? blkdev_read_iter+0x1c0/0x1c0 [ 1059.980882] __x64_sys_ioctl+0x19a/0x210 [ 1059.981702] do_syscall_64+0x33/0x40 [ 1059.982466] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1059.983493] RIP: 0033:0x7f1739f108d7 [ 1059.984249] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1059.987895] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1059.989424] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739f108d7 [ 1059.990842] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1059.992278] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1059.993695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1059.995113] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 [ 1059.997910] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1078.257122] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x600, @loopback}, 0x1c) 23:13:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x1802, @loopback}, 0x1c) 23:13:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x9000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:13:10 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1078.280886] FAULT_INJECTION: forcing a failure. [ 1078.280886] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.283210] CPU: 0 PID: 7492 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 1078.284590] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1078.286256] Call Trace: [ 1078.286794] dump_stack+0x107/0x167 [ 1078.287566] should_fail.cold+0x5/0xa [ 1078.288600] ? create_object.isra.0+0x3a/0xa20 [ 1078.289526] should_failslab+0x5/0x20 [ 1078.290295] kmem_cache_alloc+0x5b/0x310 [ 1078.291114] create_object.isra.0+0x3a/0xa20 [ 1078.291994] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1078.293028] kmem_cache_alloc_trace+0x151/0x320 [ 1078.293964] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1078.294912] __kthread_create_on_node+0xd1/0x400 [ 1078.295859] ? __kthread_parkme+0x1d0/0x1d0 [ 1078.296742] ? __mutex_lock+0x4fe/0x10b0 [ 1078.297564] ? loop_configure+0xcb5/0x1480 [ 1078.298408] ? do_raw_spin_unlock+0x4f/0x220 [ 1078.299286] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1078.300238] kthread_create_on_node+0xbb/0x100 [ 1078.301192] ? __kthread_create_on_node+0x400/0x400 [ 1078.302196] ? lockdep_init_map_type+0x2c7/0x780 [ 1078.303148] ? lockdep_init_map_type+0x2c7/0x780 [ 1078.304113] loop_configure+0x3e3/0x1480 [ 1078.304966] lo_ioctl+0xa72/0x1760 [ 1078.305680] ? avc_has_extended_perms+0x7f1/0xf40 [ 1078.306643] ? loop_set_status_old+0x250/0x250 [ 1078.307568] ? avc_ss_reset+0x180/0x180 [ 1078.308392] ? __lock_acquire+0xbb1/0x5b00 [ 1078.309332] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1078.310385] ? generic_block_fiemap+0x60/0x60 [ 1078.311286] ? perf_event_alloc.part.0+0x29d0/0x2b70 [ 1078.312313] ? loop_set_status_old+0x250/0x250 [ 1078.313232] blkdev_ioctl+0x291/0x710 [ 1078.313997] ? blkdev_common_ioctl+0x1870/0x1870 [ 1078.314954] ? selinux_file_ioctl+0xb6/0x270 [ 1078.315859] block_ioctl+0xf9/0x140 [ 1078.316696] ? blkdev_read_iter+0x1c0/0x1c0 [ 1078.317806] __x64_sys_ioctl+0x19a/0x210 [ 1078.318686] do_syscall_64+0x33/0x40 [ 1078.319475] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1078.320544] RIP: 0033:0x7f1739f108d7 [ 1078.321322] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1078.325044] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1078.326568] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739f108d7 [ 1078.328010] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1078.329457] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1078.330893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1078.332326] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 [ 1078.348859] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x2, @loopback}, 0x1c) 23:13:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x3, 0x0, 0x0, 0x5, 0x0, 0x2, 0x1088, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf75, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x11000, 0x4, 0x0, 0x4, 0x1, 0x44a4, 0xd9, 0x0, 0x2, 0x0, 0x8}, r2, 0x6, r1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000008, 0x12, r1, 0x0) syz_io_uring_setup(0xb76, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000580)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r5, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x20004000}, 0x0) syz_io_uring_complete(0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x3, 0x0, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) 23:13:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 25) 23:13:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x7000000, @loopback}, 0x1c) [ 1078.355642] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3, @loopback}, 0x1c) [ 1078.366254] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:13:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4, @loopback}, 0x1c) 23:13:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x700, @loopback}, 0x1c) 23:13:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x8000000, @loopback}, 0x1c) 23:13:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4000, @loopback}, 0x1c) 23:13:10 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:13:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5, @loopback}, 0x1c) [ 1078.534282] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1078.573328] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1078.576640] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1078.588075] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x6, @loopback}, 0x1c) [ 1078.624757] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:13:10 executing program 3: io_submit(0x0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000200)="d98e6e6b902d57749d126eef91932136e0da5664a6ae70c96556ed69e98a773d5b7aada1afd08c385a2ebec9eb021e0c395383a575ba2953b23a2e19884f786707", 0x41}]) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=ANY=[]) r1 = epoll_create1(0x0) sendfile(r1, r0, 0x0, 0x2) 23:13:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4002, @loopback}, 0x1c) [ 1078.663974] FAT-fs (loop3): Unrecognized mount option "" or missing value 23:13:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1078.700962] FAT-fs (loop3): Unrecognized mount option "" or missing value 23:13:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x10000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:13:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe000000, @loopback}, 0x1c) 23:13:26 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:13:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000200), 0x8, 0x10002) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x80, 0x3, 0x9, 0x80, 0x0, 0x1, 0x120, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000140), 0xb}, 0x4, 0x3ff, 0x10001, 0x0, 0x1, 0x1ff, 0xf2, 0x0, 0x4, 0x0, 0x46c6}, r0, 0xf, r1, 0x6) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005200210c00000000000000040a0002000800018803f68e9c1236487725800e4ce3a87c8dd9e09dfce357eb9b9c39769fcb3fc4f59a4b32a40caa4829a91908e14405820bdba3096c55528d65e19fb3b22f4677b136d0bec400774bea65ff9f43ab7f3a1e9b12fbcced77c1954ccd4bbd4cb2b6c9c019338f950d87b6fdff9a7adbf52d9e87cba997fbd10bbd694a22f40a221990e687e171a3cb155418fe1c46c9478337fb85af9f728283c650adf9db9e13ecdd5cb62ca4e554ab3eab49b070023a"], 0x1c}}, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000240), 0x20, 0xe2902) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000002c0)={'lo\x00'}) 23:13:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5000, @loopback}, 0x1c) 23:13:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe00, @loopback}, 0x1c) 23:13:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x7, @loopback}, 0x1c) 23:13:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 26) [ 1094.335237] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1094.338447] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1094.359008] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1094.374517] FAULT_INJECTION: forcing a failure. [ 1094.374517] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.376902] CPU: 1 PID: 7571 Comm: syz-executor.5 Not tainted 5.10.200 #1 [ 1094.378248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1094.379880] Call Trace: [ 1094.380409] dump_stack+0x107/0x167 [ 1094.381145] should_fail.cold+0x5/0xa [ 1094.381903] ? __kernfs_new_node+0xd4/0x860 [ 1094.382756] should_failslab+0x5/0x20 [ 1094.383509] kmem_cache_alloc+0x5b/0x310 [ 1094.384319] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1094.385434] __kernfs_new_node+0xd4/0x860 [ 1094.386277] ? perf_trace_lock+0xac/0x490 [ 1094.387120] ? perf_trace_lock+0xac/0x490 [ 1094.387965] ? lock_chain_count+0x20/0x20 [ 1094.388823] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1094.389785] ? __lockdep_reset_lock+0x180/0x180 [ 1094.390725] ? __lockdep_reset_lock+0x180/0x180 [ 1094.391680] ? update_load_avg+0x162/0x1870 [ 1094.392552] ? find_held_lock+0x2c/0x110 [ 1094.393395] ? set_user_nice.part.0+0x2fd/0x760 [ 1094.394344] kernfs_create_dir_ns+0x9c/0x230 [ 1094.395236] internal_create_group+0x793/0xb30 [ 1094.396159] ? set_user_nice.part.0+0x2fd/0x760 [ 1094.397112] ? sysfs_remove_group+0x170/0x170 [ 1094.398018] ? lockdep_init_map_type+0x2c7/0x780 [ 1094.398977] ? blk_queue_flag_set+0x22/0x30 [ 1094.399856] ? __loop_update_dio+0x2d2/0x690 [ 1094.400777] loop_configure+0x954/0x1480 [ 1094.401616] lo_ioctl+0xa72/0x1760 [ 1094.402350] ? avc_has_extended_perms+0x7f1/0xf40 [ 1094.403321] ? loop_set_status_old+0x250/0x250 [ 1094.404255] ? avc_ss_reset+0x180/0x180 [ 1094.405069] ? lock_acquire+0x197/0x470 [ 1094.405872] ? find_held_lock+0x2c/0x110 [ 1094.406702] ? __traceiter_irq_enable+0xc0/0xc0 [ 1094.407657] ? __lock_acquire+0xbb1/0x5b00 [ 1094.408575] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1094.409643] ? generic_block_fiemap+0x60/0x60 [ 1094.410578] ? loop_set_status_old+0x250/0x250 [ 1094.411500] blkdev_ioctl+0x291/0x710 [ 1094.412269] ? blkdev_common_ioctl+0x1870/0x1870 [ 1094.413241] ? selinux_file_ioctl+0xb6/0x270 [ 1094.414133] block_ioctl+0xf9/0x140 [ 1094.414865] ? blkdev_read_iter+0x1c0/0x1c0 [ 1094.415737] __x64_sys_ioctl+0x19a/0x210 [ 1094.416567] do_syscall_64+0x33/0x40 [ 1094.417336] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1094.418369] RIP: 0033:0x7f1739f108d7 [ 1094.419120] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.422850] RSP: 002b:00007f1737485f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1094.424387] RAX: ffffffffffffffda RBX: 00007f1739f5a970 RCX: 00007f1739f108d7 [ 1094.425833] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1094.427282] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1094.428727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1094.430161] R13: 0000000000000004 R14: 00000000200000b0 R15: 0000000000000002 [ 1094.484542] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:13:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5e00, @loopback}, 0x1c) 23:13:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x1802, @loopback}, 0x1c) 23:13:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @loopback}, 0x1c) 23:13:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x16e59541, @loopback}, 0x1c) 23:13:26 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1094.636863] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20100000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1094.659966] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) (fail_nth: 27) [ 1094.678378] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4000, @loopback}, 0x1c) 23:13:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x80fe, @loopback}, 0x1c) 23:13:42 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1110.663836] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x18020000, @loopback}, 0x1c) 23:13:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8cffffff, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:13:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe, @loopback}, 0x1c) 23:13:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:13:42 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) move_mount(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x51) [ 1110.680771] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1110.689662] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1110.693324] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1110.710273] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xc0fe, @loopback}, 0x1c) 23:13:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xc0ed0000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:13:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4002, @loopback}, 0x1c) 23:13:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x50, @loopback}, 0x1c) 23:13:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:13:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x29dc5490, @loopback}, 0x1c) [ 1110.872007] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1110.889767] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0xfeb8, 0x12000) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0xf0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001d004527004000000000000006"], 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xff}}, './file0\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)={0x38, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x18, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x630]}}]}]}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(r3, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r5, 0x8, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4000010) sendmsg$NL80211_CMD_START_NAN(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r5, 0x910, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x3}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x1}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1}, @NL80211_ATTR_BANDS={0x8, 0xef, 0xe67a3e9c39929d11}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8880) [ 1110.910207] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1110.917130] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1110.937238] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:13:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe803, @loopback}, 0x1c) 23:13:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5e, @loopback}, 0x1c) [ 1126.646080] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1126.654508] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1126.681750] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc, @loopback}, 0x1c) 23:13:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:13:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xf6ffffff, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:13:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:13:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4800, @loopback}, 0x1c) 23:13:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x40000000, @loopback}, 0x1c) 23:13:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xf401, @loopback}, 0x1c) 23:13:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x2) close_range(r0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x843, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x900, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e21, 0x80, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x14}}, 0x8000}, 0x1c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/devices\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) sendmsg$nl_generic(r3, &(0x7f00000002c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f00000020c0)={0x100c, 0x2b, 0x800, 0x70bd28, 0x25dfdbfd, {0xe}, [@generic="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"]}, 0x100c}, 0x1, 0x0, 0x0, 0x4000}, 0x4480) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_bt_hci(0xffffffffffffffff, 0x0, &(0x7f0000000080)) sendfile(r2, r1, 0x0, 0x80464c453f) [ 1126.710208] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1126.714404] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1126.740915] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1126.750827] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:13:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5000, @loopback}, 0x1c) 23:13:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x1f4, @loopback}, 0x1c) 23:14:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f00000001c0)={'vlan0\x00', 0x0}) 23:14:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5600, @loopback}, 0x1c) 23:14:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:14:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:14:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffff0000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:14:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc00, @loopback}, 0x1c) 23:14:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x40020000, @loopback}, 0x1c) 23:14:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x218, @loopback}, 0x1c) [ 1143.480743] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1143.496088] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1143.508441] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1143.525765] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1143.533975] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:14:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x240, @loopback}, 0x1c) 23:14:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfe80, @loopback}, 0x1c) [ 1143.554948] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:14:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:14:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4195e516, @loopback}, 0x1c) 23:14:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5e00, @loopback}, 0x1c) 23:14:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffffff8c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1143.693118] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1143.693281] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:14:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:14:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1143.758835] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:14:16 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:14:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x300, @loopback}, 0x1c) 23:14:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfec0, @loopback}, 0x1c) [ 1143.850419] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1143.864602] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:14:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x48000000, @loopback}, 0x1c) 23:14:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:14:16 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x80fe, @loopback}, 0x1c) 23:14:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xfffffff6, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1144.004771] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1144.044331] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:14:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff00, @loopback}, 0x1c) [ 1144.070615] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:14:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3e8, @loopback}, 0x1c) [ 1144.107865] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1159.399342] net_ratelimit: 2 callbacks suppressed 23:14:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x500, @loopback}, 0x1c) 23:14:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff0f, @loopback}, 0x1c) 23:14:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x50000000, @loopback}, 0x1c) 23:14:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:14:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="2e7ee04cb383273d56994405b183d3d25325d1ad9d35059429bccf8af5c93608000000161eb7850a8f803d29fe6696a71dcf8b51531f73ea87c23962c031dd6c8908fb02000000ba5d0c9fbc918fa5d0740f84986e4a3ef5746e5bcf49ba5da00d2ccafc2d6cac39dafdd97fad219bf52f209a79ccad4dd5f7f693550b1fca39dcd01273bce8c3668e7c817824c211bee8cd039f55c911ad8207a556c88463d022cbc35336c5e91c595998a1025f4206dc1d48fef91feacf438284e6cbd547aa0cc175884ee59791bc9bd3b8710cca5e54f4a9607712bac9b898a05b35725a3c1285be0bdadb467bf32918c392c4dfa7580bed83450f06c5acc3869a74863599e46122041bc62068daae7801aa8edb8dfdba04818cfeef30bc2ad78543cd232d4091f1616811b56999e71c43be325a90ead3477be52882d63aab073db88c7ccc47f9fba007000000276335c4e45162"]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x5) pipe2(&(0x7f00000000c0), 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) openat(r0, &(0x7f0000000040)='./file0\x00', 0x210001, 0xd4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 23:14:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xedc000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:14:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xb8ff, @loopback}, 0x1c) [ 1159.399357] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:14:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1159.419056] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1159.431570] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1159.441683] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1159.482177] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1159.587443] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1160.019971] FAT-fs (loop3): Unrecognized mount option ".~àL³ƒ'=V™D±ƒÓÒS%Ñ­5”)¼ÏŠõÉ6" or missing value [ 1176.115099] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1176.121216] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1176.138189] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1176.144826] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1176.150235] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1176.174659] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:14:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:14:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x600, @loopback}, 0x1c) 23:14:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:14:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xc0fe, @loopback}, 0x1c) 23:14:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x56000000, @loopback}, 0x1c) 23:14:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:14:48 executing program 3: unshare(0x28020600) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/mdstat\x00', 0x0, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x80000002}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) unshare(0x20800) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r3, &(0x7f00000000c0)) sendfile(r2, r2, 0x0, 0x3) fallocate(r2, 0x4, 0x7fff, 0x1) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r4, r4, 0x0, 0x3) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "63184e7801eacf38a266602f60032311c1272ddc6062a102d5873e643ceb82f849cc11d69140a2add1e5a2f018a17a246aa375871456299b6f7773788d969444", 0x33}, 0x48, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000240)={@desc={0x1, 0x0, @desc4}, 0x4, r5, '\x00', @auto=[0x30, 0x21, 0x33, 0x34]}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 23:14:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x1000000, @loopback}, 0x1c) 23:14:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x100000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:14:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x2000000, @loopback}, 0x1c) 23:14:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x700, @loopback}, 0x1c) 23:14:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x58748369, @loopback}, 0x1c) 23:14:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe803, @loopback}, 0x1c) 23:14:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:14:48 executing program 3: sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @rand_addr=0x64010100}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040000}, 0x4000080) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}, 0x840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) flock(0xffffffffffffffff, 0xa) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0xfffe, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10, 0x0}, 0x404c008) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) dup(0xffffffffffffffff) ioctl$VT_DISALLOCATE(r1, 0x5608) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 1176.355460] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1176.360883] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1176.377876] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1176.383038] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:14:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3000000, @loopback}, 0x1c) 23:14:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x200000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1176.433051] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:14:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:14:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5e000000, @loopback}, 0x1c) 23:14:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xf401, @loopback}, 0x1c) [ 1176.630078] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1176.634697] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1192.641339] net_ratelimit: 2 callbacks suppressed [ 1192.641353] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x69837458, @loopback}, 0x1c) 23:15:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:15:04 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x134, r0, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0xfffe}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0xac0}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0xfffb}, @NL80211_ATTR_IE={0x55, 0x2a, [@mesh_chsw={0x76, 0x6, {0xf6, 0x1, 0x12, 0x2}}, @tim={0x5, 0x3, {0xd3, 0x98, 0x3}}, @ht={0x2d, 0x1a, {0x400, 0x2, 0x3, 0x0, {0x9, 0x6, 0x0, 0x316, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x400, 0x81, 0x4}}, @peer_mgmt={0x75, 0x16, {0x1, 0x4, @val=0x3ff, @void, @val="8bd4dd23b5f5997e9a3a8bd0ae59ead5"}}, @supported_rates={0x1, 0x2, [{0xb}, {0x9, 0x1}]}, @chsw_timing={0x68, 0x4, {0x2, 0x1ff}}, @chsw_timing={0x68, 0x4, {0x6, 0x6}}]}, @NL80211_ATTR_SCAN_SSIDS={0xa4, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}, {0x1c, 0x0, @random="45dfbea010fd00f8bfce88ffd10066120cfd831c42d5466f"}, {0xa, 0x0, @default_ibss_ssid}, {0x11, 0x0, @random="4f50356ce45b496afb12f31b27"}, {0xa, 0x0, @default_ibss_ssid}, {0x1b, 0x0, @random="f23a0a01bbfad095faf26daaf4c08a7457f1a146d26311"}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40804}, 0x48000) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r0, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x80}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x8}]}, @NL80211_ATTR_MAC={0xa}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x41) r3 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x2000, 0x10) close(r3) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), r2) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000480)={0x0, @dev, @loopback}, &(0x7f00000004c0)=0xc) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000800)={&(0x7f0000000400), 0xc, &(0x7f00000007c0)={&(0x7f0000000500)={0x2bc, r4, 0x8, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x8}, @ETHTOOL_A_LINKMODES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKMODES_OURS={0x234, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x400}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x62b4}, @ETHTOOL_A_BITSET_VALUE={0xe6, 0x4, "08c8854a5fb32ed65431ac25c72f0981a47d000f6c5577623f9025e757d04c53e5e9cec33de65fd51c0ee6910384aa816e5903b8d88c13d3ddc85ecf574cee22d33052ca441a55e4045410e3ffba7c3efa3c227bdc6a81a7bee5cacc536343cb507942b219ec9d8239cfb6fab7ac30e391533c327504fd5a9ae7b062a9abd68afd71dd84631ff0eff64ae43e4879aedb31b8c68b413f80c17f5cc65a3202092092a364701d2835b1b880dabf843c76fed1b93d33c93ddda0162f0179e31979bf29d627dc931b91fb6a8ccf41043e7da2ee845cc1eb98d11ded94b874999ddd6e2a0f"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_VALUE={0x14, 0x4, "880f6596f69ce97d66584f282d6eac61"}, @ETHTOOL_A_BITSET_BITS={0x110, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x02\x02\x02\x02\x02\x02'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '.\'^^}![\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x01\x01\x01\x01\x01\x01'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffe0}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8bc}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ')*$\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x02\x02\x02\x02\x02\x02'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '##!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7c}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '*!-{\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x87}, @ETHTOOL_A_BITSET_VALUE={0x4}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x97}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x700}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x20}]}, 0x2bc}}, 0x1850) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000980)={'gretap0\x00', &(0x7f0000000880)={'syztnl1\x00', 0x0, 0x1, 0x7, 0x3, 0x2, {{0x30, 0x4, 0x0, 0x6, 0xc0, 0x66, 0x0, 0xd6, 0x2f, 0x0, @local, @broadcast, {[@timestamp_prespec={0x44, 0x44, 0x80, 0x3, 0xf, [{@dev={0xac, 0x14, 0x14, 0x1e}, 0x75d5}, {@broadcast, 0x3}, {@dev={0xac, 0x14, 0x14, 0x15}, 0x3}, {@multicast2}, {@local}, {@rand_addr=0x64010102, 0x1}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x80000001}, {@multicast2, 0x8}]}, @timestamp_addr={0x44, 0x1c, 0xb2, 0x1, 0x8, [{@empty, 0x9}, {@empty, 0x1}, {@local, 0xfffffa60}]}, @cipso={0x86, 0x4a, 0x2, [{0x2, 0xf, "663181eaf0d4b6f677ed0c856d"}, {0x7, 0x9, "56ac1f67651c9a"}, {0x6, 0x4, "d947"}, {0x7, 0xa, "4a5ae06929ed084e"}, {0x7, 0x4, "e5d4"}, {0x5, 0x8, "cb5cc5944143"}, {0x5, 0x12, "b5bd04f89697626c4dca8c848c53aa06"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f00000009c0)={'ip6gre0\x00', 0x0, 0x29, 0x20, 0x20, 0x6, 0x4, @loopback, @mcast2, 0x20, 0x20, 0xffffffbf, 0x2}}) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000a80)={@rand_addr, 0x0}, &(0x7f0000000ac0)=0x14) getpeername$packet(r2, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b40)=0x14) getsockname$packet(r2, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c80)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000cc0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000d80)={'syztnl1\x00', &(0x7f0000000d00)={'syztnl2\x00', r5, 0x29, 0x0, 0x0, 0x9bd, 0x4a, @local, @private2, 0x7800, 0x8, 0x180000, 0x7fff}}) accept4$packet(r2, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @multicast1}}, 0x0, @in=@initdev}}, &(0x7f0000000f40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001600)={&(0x7f0000001040)={0x588, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r6}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x692}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r5}, {0x19c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x326}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6e9b}}}]}}, {{0x8, 0x1, r5}, {0x4}}, {{0x8, 0x1, r5}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r8}, {0x260, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r14}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x588}, 0x1, 0x0, 0x0, 0x40000}, 0xc001) 23:15:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4000000, @loopback}, 0x1c) 23:15:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x700000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:15:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfc00, @loopback}, 0x1c) 23:15:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe00, @loopback}, 0x1c) 23:15:04 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1192.692634] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1192.697693] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:15:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x1802, @loopback}, 0x1c) 23:15:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4000, @loopback}, 0x1c) 23:15:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x800000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1192.795370] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:15:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfe80, @loopback}, 0x1c) 23:15:05 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa0002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1241}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x8, 0x8, 0x81, 0x2, 0x0, 0x4, 0x840, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0x1fffe000000}, 0x6404, 0x1f, 0x0, 0x0, 0x7, 0x8, 0xe, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r0, 0x2) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000040)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, 0x50, 0xffffffffffffffff, 0x8000000) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000440)={{}, 0x0, 0x10, @unused=[0x101, 0xfffffffffffffffb, 0x101, 0x80040], @subvolid=0xffffffffffffbc6a}) openat(r1, 0x0, 0x900c0, 0x0) 23:15:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5000000, @loopback}, 0x1c) 23:15:05 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1192.872134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x9054dc29, @loopback}, 0x1c) 23:15:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x6000000, @loopback}, 0x1c) [ 1192.919017] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x900000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:15:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1193.005992] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1193.037217] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1193.088931] cgroup: fork rejected by pids controller in /syz4 [ 1209.999755] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4002, @loopback}, 0x1c) 23:15:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa00000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:15:22 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:15:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x91ffffff, @loopback}, 0x1c) 23:15:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x7000000, @loopback}, 0x1c) 23:15:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfec0, @loopback}, 0x1c) 23:15:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:15:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x4) r2 = dup2(r1, r0) r3 = eventfd2(0x0, 0x80001) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000140)={0x96e, 0x8, 0x81, 0x2, 0x80000000}) inotify_init() r4 = openat(0xffffffffffffffff, 0x0, 0x20000, 0x80) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x80002, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000240)={0x8}) syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x10000) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) openat(r2, &(0x7f0000000180)='./file2\x00', 0x101080, 0x80) openat$vcsu(0xffffffffffffff9c, &(0x7f00000003c0), 0x143004, 0x0) sendfile(r6, r2, 0x0, 0x7ffffff9) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$HIDIOCINITREPORT(r7, 0x40085503, 0x20000000) openat(0xffffffffffffffff, &(0x7f0000000380)='./file2\x00', 0x4408c0, 0x80) [ 1210.016959] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1210.017285] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1210.067544] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:15:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb00000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1210.113454] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:15:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8000000, @loopback}, 0x1c) 23:15:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xff00, @loopback}, 0x1c) 23:15:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5000, @loopback}, 0x1c) 23:15:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xb8ff0000, @loopback}, 0x1c) [ 1210.177720] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1210.216873] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:38 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='affs\x00', 0x20020, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0/file0\x00', 0x240400, 0x180) unlinkat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x0) getdents(r1, &(0x7f0000000c00)=""/4096, 0x1000) syz_open_dev$vcsn(&(0x7f0000000180), 0x6, 0x6e003) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x37) 23:15:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:15:38 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:15:38 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xff0f, @loopback}, 0x1c) 23:15:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe000000, @loopback}, 0x1c) 23:15:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5e00, @loopback}, 0x1c) 23:15:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe8030000, @loopback}, 0x1c) 23:15:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1000000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1226.111455] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1226.114717] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1226.134221] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1226.143792] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x18020000, @loopback}, 0x1c) [ 1226.164534] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:15:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x80fe, @loopback}, 0x1c) 23:15:38 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xffb8, @loopback}, 0x1c) 23:15:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1226.248768] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:15:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000680)='./file0\x00', 0x80000204) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x10) lsetxattr$trusted_overlay_upper(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), &(0x7f0000000740)={0x0, 0xfb, 0x5d, 0x4, 0x0, "165502d75e2690c1063011b4e5c3b08a", "91781fc0d1445b9b4ebee2538bb7eaaf36d750b0eae6ae208ce7cb59a6f4f354b4c9c02fae441df066e19a7dc17d1255ce87e41b5fc98e2228fd5beead5986c8681b09e857a6fef6"}, 0x5d, 0x9a72b37939c5c57b) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x100, 0x6, &(0x7f0000000500)=[{&(0x7f0000000280)="5abc578a350d253000c9e0584173589d197923398f4d3e2dfe84ba1a7a3549a5be5bf0741f5078cf0f7513059eb4c7008c380e71bd4a102ebaaba3e4520f6f8929b50ef4f32c8f9d13", 0x49, 0x5}, {&(0x7f0000000300)="e4f3ca6aafb5dbeccc77e0f41290f7f4065fe531092de96723f10bf41ecb3676daf448efb8c88e5f836e2a27015bad7df2fac2d3498b5edcdb6dca656e5ef9d96c199eae0b5102fb1bc72641a2a1133502df8a8fd2956a065bdb1da73cb100f99f07", 0x62, 0x4}, {&(0x7f0000000380)="7a78db626cdcff311bf9690f19a3e59fb9a4cc14c215ff7c0ae368eeedc43d18bf1b0807a54b8886414aefffbaf8e22daf6c9fc3af52eb64f674857321165ebf6a66c8208c18e7aa60c53c2f5787cb96dccb52945b93a371f570da1bdb1f2253c56e242644b66ebcfdece270f6b0bfb943454442ef4fbde9060955a2037b2d99c5a2ea2838ea583295e20aacfd1ac9631afeff12d9a28d0b740af44fd01478741f79d1f40746b4f1dfd2a260ed5fd1e62bf5bd18f50bc7ab01fe1d86c88964", 0xbf}, {&(0x7f00000001c0)="cf09cfa7e8efd3affefc3e87f05d725107804209c2dd2f8551", 0x19, 0x7}, {&(0x7f0000000440), 0x0, 0x2e3}, {&(0x7f0000000480)="b9af68dc74e1b514cd8864a9700ed39e7c5c2b748a8e1eea1b3be401666104439015613e1f429da3e323433db5fe3061e1a7f608fef10df112fade0eb9c9fc8a4823a67e431de046b48806e4b786", 0x4e, 0x2}], 0x20000, &(0x7f00000005c0)={[{@mode={'mode', 0x3d, 0xfffffffffffffe01}}, {@huge_never}, {@mpol={'mpol', 0x3d, {'bind', '=static', @void}}}, {@huge_always}, {@mode}, {@size={'size', 0x3d, [0x34, 0x34, 0x39, 0x37, 0x36]}}, {@mode={'mode', 0x3d, 0x1}}, {@nr_blocks={'nr_blocks', 0x3d, [0x38, 0x67, 0x74, 0xc]}}, {@size={'size', 0x3d, [0x2d, 0x37, 0x36, 0x42, 0x31]}}, {@size={'size', 0x3d, [0x33, 0x6b, 0x38]}}]}) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x220000, 0xe4) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1226.305211] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:38 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1226.324303] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xf4010000, @loopback}, 0x1c) [ 1226.398590] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1226.413557] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1226.442258] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1226.452448] kauditd_printk_skb: 9 callbacks suppressed [ 1226.452472] audit: type=1400 audit(1699917338.671:30): avc: denied { watch_reads } for pid=8506 comm="syz-executor.3" path="/syzkaller-testdir124866644/syzkaller.oC9XGO/109/file0" dev="loop3" ino=2 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=dir permissive=1 [ 1226.646557] EXT4-fs (loop3): Unrecognized mount option "tmpfs" or missing value [ 1226.684763] audit: type=1400 audit(1699917338.903:31): avc: denied { watch_reads } for pid=8506 comm="syz-executor.3" path="/syzkaller-testdir124866644/syzkaller.oC9XGO/109/file0" dev="sda" ino=16067 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=dir permissive=1 23:15:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xc0fe, @loopback}, 0x1c) 23:15:54 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:15:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x20000, @loopback}, 0x1c) 23:15:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r0, 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @loopback}, 0xc) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) lseek(r1, 0x800, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:15:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:15:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x21eda646, @loopback}, 0x1c) 23:15:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2010000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1242.758263] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xf5ffffff, @loopback}, 0x1c) [ 1242.774098] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1242.804840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1242.811782] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:15:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe803, @loopback}, 0x1c) 23:15:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40000000, @loopback}, 0x1c) 23:15:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfc000000, @loopback}, 0x1c) [ 1242.916948] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1242.932890] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x1000000, @loopback}, 0x1c) [ 1243.008440] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1243.024945] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:15:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:15:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40020000, @loopback}, 0x1c) 23:15:55 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:15:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xf401, @loopback}, 0x1c) [ 1243.101239] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:16:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x185914b, @loopback}, 0x1c) 23:16:11 executing program 3: sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x8001) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x18, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @nested={0xc, 0x8, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="180000003500001300000000fcdbdf250800000004008d00"], 0x18}, 0x1, 0x0, 0x0, 0x8001}, 0x4000) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) socket$netlink(0x10, 0x3, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000600)=@can, &(0x7f0000000680)=0x80) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="cc010000", @ANYRES16=0x0, @ANYBLOB="00027e080000fddbdf25890000000c0099000500000061000000ac011d8048000080060005006f00000006000500970000000c000200ee0000000000000005000700af0000000c00020005000000000000000c000300f8ffff6c03ffffff05000a0000000000600100804c010d804c0003803d0002000f4a452915371b250e152748170311411e4e49414d4f212449430e05313b2e0346314a2d38061240194819410d3b2017422649453810414a2a00000005000400010000004800018014000300ab51ff00090003003500ff01ff0f0100080002003a4903481400030006000300090000010004ff0717008100140003000200ff0f4000080040fe050002000700a8000080240001001b3f0624606c03040a063248480c0b6b060536062406186c60481b391601050604000100460002002410003d493d04271e3a342f0a011635032a0e12442b432e09562b3b0f403c2119492c450518293b38053c0c085102170a4e09280a2d141a060b120d183e4a48294200003400020025570a4e111d404d4500093e1e2a091b213109452f3f2e094657101f39012820402737060e21283c491d4522291048540c000180050004000200000005000a000000000005000a0000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0xc1}, 0x200040c0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESDEC, @ANYRES64], 0x5c000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYRESDEC, @ANYRES32]) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) accept$packet(r1, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000046c0)=0x14) [ 1259.756040] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1259.756697] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=8700 comm=syz-executor.3 [ 1259.763952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1259.795049] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. sendmmsg(r0, &(0x7f0000006f80)=[{{&(0x7f00000006c0)=@nfc={0x27, 0x1, 0x1, 0xf}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000000740)="1af78a57a05ed4a19be5885e421f85d02cf11821e92c315f7c274a0f4126423aea22ed624dc96584a79f36b2a25907efc78486cd03e541b95c4b67fac815b765054539e1541eb0f7c2ecc6b7039b14e91417865a1cf8024eff4e7789107a", 0x5e}, {&(0x7f00000007c0)="1bfac75c8dc224f95d15890ef41d77a129949b54ed07b900237a7af741b0cc6acf32e42f67039e7219663a29478ced4835eeccaa225d5eb0b62b753d55c26bebcfe71482902a5b6e07331396526da352f281d2ef96427c25b8861047db79f7163ed747ec2487a41153d8c9e64862bd715d8ab67c3ce753826e4ca9e7d4acd4b89de09d1fb75456d9fc7a8420dcdf0594acae3ed00cbd3370dc68931f2b28f592eea1db5e5028a559d3963182a1c8185c55c2216ec5624ca922bd", 0xba}, {&(0x7f0000000080)="983b7f", 0x3}, {&(0x7f0000000880)="9fc7da0af881d88d8f6836f14d68e3c24de447c3fb03263ed59fa36aef0686fbce172796311790b49f2943cc7e6635d8fcb173523d31df2853cdbdb05f328585f2b5d13f70d6a54599b58221791f4ffac8c6376247d35ce28589b1acaf9e180168eecf822cf4a5db407d7453a55ec47eaefb34334c34113aa2115d86eddac882a4dce808ce2badd676a668f477df7c77da6702981485c41fb0ccead45abfc11c64c9346ec33b0e88e7a50209b81c6fe8fcd1e8382ed79b6a4206093302ccf9d9745e8f730a6d1d8381378497ba66bd6d85ea10fa4acc502f4de10b8e4ab19d15", 0xe0}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="2402288a671160f743a803f090e750c0221aceb7584e57a297188a59f38a64087764ebdf93f75a132387c461d468ff19d045cad0d043ba9c17f7861bbeb7fdd059efab69ec44e02aef6556c8c71d2075b11ce524f795f5542ee0e7cc27805b052dbbf89fbccd42aff8c0070e2003a3d008ed46d2e57a2fef7d034f5bc506a6687271bc71f714fa57f11617821e109d49a53323b99cd15dad35f1d89a949290535d5d0f3edb387f25b145737b73df8648301f6e09c1e32c3eba4e95d441faaeb2718e4be693d7c6cd67b425c6ceb25282ccc4e3c37c6915521d07bf66059bfabf03", 0xe1}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000001a80)="f23ee079cc1613298b7cd8cf6507dfd3fb40ea6491ed2e59ad1a4844b5b3ac79688121bd0aeeb24cf07f414256bf50a00e9a0a21c1f6dcd2131d6c34cbd95a83ff3c1948b66af8d84117721788bdf5538d5a7c451e1c22e0b8ff643057ecf9be37a353ba6b9355b2efa1ee115075e4b82051fe441cb5bfb5be1183b1f778e7692d19d0a8af7aab5533772e6159cdbf54e47851ee996b302b03834f84f3577cf2a6246130550e2509b81b609564345d58eee6ea81c95bb7e3d77107892f9f92cafb96cdf27db2b6ecec7cda2101ec408577c146eefa5215df6a1619d105bd28adb95dea9eeadba92c30f3485d77c3e76354f11c0d86fe68cf", 0xf8}, {&(0x7f0000001b80)="c8b419544bf6e2e514c7910cd7cdff2d1887fe5f2847c2346d1c8a8fe43b95c5a21eadc28bf7cc5c89150e2629436d6dc23162886daf6ca10da79389d3fda74af40e27203cef5e3b4a810fe75a2ed947dd7f3900da2656ab466543f134b31f3d33b679e1e7cbe98b18671afa39195ad5970e508d5305d05bd317b290defae654d36b245c7725a68a4987a6758b8baec09c", 0x91}], 0x9, &(0x7f0000002e00)=[{0xe0, 0x115, 0x4, "12db0a1ba5a5b0ca6a94e3e502194b6f3d0a3fd408d1be94ba6ab7a8851f8f9fbf82adb896404d4d509c74eaa7c91dbe02c972dc152e14fcaa4712c6bc560e5e6db1c6f9aed6a101139e2322b47042e2168ef87937a18dc91a5409eb40acc0c92702c6a36f3e9e7618025454ac0b1b946d469447ca03b5a5d4ec84a7c1a3bbb066ac223598da3401fd751a1a6816c357a4ed56145f9d2e59ea62d65b6eb279db7d831c3e51dcab78fb98e7cc98778b85ff317a97ac3481261f725c0dfffff2192edf7bf01031f31907d077"}, {0xc8, 0x101, 0xcc43, "4e1c069673a753629f8a4abbc9f6d5268d66c2caff805d3b29ab92bcc46a1230c74c40637888a9f8e28b769562d786db637ca7ab220d293e2963c810f8330a47afb30007e2d14ad36d622ccec60861e874d64afe370e318ed1d3229d4f609f4b94b929aa5d872f42b4c0eac47f5c2dcd52f68d71128a858ccf0b94b903ba1a5301388e53df73c6319b8250f52948b12a4ba917114964dc29bc66fa00c72c856099ccaf0b8fe28c9cf67533da94fe4c72c769365dad"}, {0x108, 0x114, 0x6, "48eb706d304881da7076f2133c0c568c44884db2059ae26d24dafbe025b4309c95081fe53468fb6a16c7e594ebf82a640c343aed19d7ccf2464666794f3979b64e75ec01eb5ea812762e0e50fe2244a9833e642a2dbfb715c024d0edd3287962773335f94b9dfc28a83037d2b3f9b4c94d7a485b28bea661f1d562c47770882e3221c8c099e0d62d6772e0dca9f8c31c956017cdfa40fc2c1f6a7bb2ba21cbd8bdbb8c89dadc32f585613df77f15750729951c5f9e36e936efdeef9fc20e4177f30a06415883de9c6097eab03969cd25af36e73aa89e4fb0d071708a21b3be031ce2f32e36a0e9245fd675fd3a4e147c21d583737828"}, {0xc0, 0x0, 0x8, "94858d268d6c0cfdea51815ce5171f65956b0e24dd732a976869ef2ab5cad571e14d748d5ec6630a6fea7e6b1ec32a499fe95ccbf14ffd68b0ab0fb097a19dfe5090dbfb91d488339f697bff54843b762c688f5518afb54dffcd436eee2c7b2e0c5a9ad2dda69b3499dd6221c97fa174fb5effce71d622fb5923c7e4063420d43caa87485a1ad7d5416cc573f66a8990feaa7e422d1591631d0bae76298620796ab266ae41a2945ecb"}, {0x98, 0x0, 0x22, "5b3a6e1e31f4f9bce927a5ce75d580d827dfe1187a5584019a951cda6fb2b16465ad1cc5c45ffba96c7314d46236ee1c7ae8221d329d3e512a15a678f22cf16645d177f632f9124d9bed6011dbfe2ed10057909a16f89709be1c5efb8a12ff3917f298cdf5e53b609f317267cdfa610451395c32ebb9e554fe7b00bc8a6486d6c3a28dc6d6e57f32"}], 0x408}}, {{&(0x7f0000001d00)=@pppoe={0x18, 0x0, {0x0, @random="4596ee0fc6ba", 'macvtap0\x00'}}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003240)="bb4d77f11ca67b83629cd6c09d998a25c3f1e1", 0x13}, {&(0x7f0000003280)="b9bfb7590ca06cc014c00e94bd88d6fa1b367c1a4433376c4039c33fb7b3dc31982c087698a120270d1e1ba7e615ac6f21d705ebac6aa0d62808922b5cac986d30a4b8cedd", 0x45}, {&(0x7f0000003300)="b755839c98885ff5136e259b1dc9f38483e29e5603a7f371b3752017d1fd3e7f89d1b67b3fccf58ac8c83ea3304c923b92158fa5a109f46d890974ec2f312f19a6088d99e557601d03d262047b06ce983b57d933297828c3a217f52e3b9d65ba36476f89b6bba64a35106901cc6a8217b3532fb8a61fa42dc4e0a94e07a30053010acda275db99120198e2b0b99b27c0e701643bd420cd47c76a6066df1190a9b932a732b140d9d63f829553e154a5b51ef6653da95d093c0b10ef70c1b433c731f38fb31c974a50b69a0d2ce66a66cfca83ab8dffdb4b0143ba20d9e6358334d5f1e4d3f04f557930e9bce3722976a85aac8797a73b99e8", 0xf8}], 0x3, &(0x7f0000003440)=[{0x1010, 0x114, 0x6b94, "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"}, {0x90, 0x118, 0xee81, "535e8f124966d80913d86cea7838ecf215b4cbb7ac93ad81679c20e9ccbabc7e5e67b755d2bd27bf07edb31d19634898b6d9744c732e1c16b4b769c68f258100c01979367583eb9d6d7da7e3a36805fc788457e70fc470404c168fca781755bfba7db5b3cf0298b9a3a267f3d0940626d8935752d4ca63d922eb03b601342b"}, {0x88, 0x110, 0x7, "f4c4a7212a8290aa7ca04031389c253a451a7b829588abe33dcd956b34af859f2abf9f19d2df3bf813e15a92062bfe33d461b41712fb54d504984d58c2c7d42e29bd0386995e90bd0964502c35f69dd50a3bb5769fe1e9104adbf513204743d354977ac28529c21e5e3c387ac9816963ca9f"}], 0x1128}}, {{0x0, 0x0, &(0x7f0000004600)=[{&(0x7f0000004580)="2bc63c86c2078a4223d3c57f2d60ece7ccf764e40ff3912b381c1d402629af40c3dec9ec0915ad55771e1f", 0x2b}, {&(0x7f00000045c0)="619001ca2539c8221a5485d8dcc197bdddb2c21f2dd62c12e593b9fdeb9b58ad784e58ead2677fd494397751beb4f0db03", 0x31}], 0x2}}, {{&(0x7f0000004700)=@ll={0x11, 0x33, r2, 0x1, 0x3f, 0x6, @remote}, 0x80, &(0x7f00000048c0)=[{&(0x7f0000004780)="65d8ae8039ef5627eaf3e4182ca5413db1dc74691d44867a0ea134efbc5fb06a2e6ac0c00462db04152c0624adaf9d51f9aa76ce8243b95d1d4ab495f4f409f284862e22b6bb885b9f703eea53ff06fb69555aaaa0ed9065f9502c0d3a8fa6", 0x5f}, {&(0x7f0000004800)="694fd3d279efef870372b2e5fec79bd6dca6985501a8fe913bf85f1c2ca13c1fb93da1029e7e565d80fada4d931371d96c4d5890bd7f348b9f818087bc16093c167b4144e5283031f4c4f4ff97ea51dfb275790cfe59a55f303a454e05d700d7dd6a33384089e76da662caf7a1e2f1b88d9845598e9f37cc9938aa7237808e884f2343ab28fc6163312769362251f9d8bf33e0a5625d17fa4bc42ed1d297bcd718dd297e4c", 0xa5}], 0x2, &(0x7f0000004900)=[{0xa8, 0x112, 0x8, "8ffe5f96730182ae9143fb01f82e9227391fdc401eb10928c05165d742c1c21294cfc6b5270130bd26e2dbdee0ff3704e8e97e78d0110e5cb71e779a9d01266e53ef58ad95e58aba6de988b2dea722ef15d49c1604240fcc270d6ee2e28e86c3e2dafd7722c3e8b789c4e0539d9f6e2afe5a1dd5d7284e3f7ff97abd5e46830a69d7f83b5361993571792e7d24bbb5616078d70152"}, {0x1010, 0x118, 0x0, "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"}, {0x28, 0x104, 0x5, "ab5fb7ff52e368b31f438fcff2969f06030512"}, {0x10, 0x104, 0xfffffffc}], 0x10f0}}, {{0x0, 0x0, &(0x7f0000006b00)=[{&(0x7f0000005a00)="69818f6770b67a7a55be9f8560007251abd9cabb2efae1e779ee2ec5162583cb23d3596c32fca9be986658a2800daa7cf438a692edc2921b4f4c560791f28cef0b3581c26e4889c375b966b05ef15735aa153ea961e531d0be6917a0a183d82d395dd83863ae7e631d7e3dfe943e4518393fbb606807931cd050e1b34a2555c121232ae5f2f521d67bcd7549641355a4819f2b5f81f8473a353f7f872d722ee74501abb0baa10cdfc82017aeb33edf8e029b71da3449c1756296b248cb35c9422290c07c4f293f1d6d96", 0xca}, {&(0x7f0000005b00)="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", 0x1000}], 0x2, &(0x7f0000006b40)=[{0xe0, 0x112, 0x0, "d6123e30a8263c20fe2a694431b743f2b7712ed14dfca6663586b9a187167d6d222077299facec3573eb2c20cc48b5a4eef52120802206ce99f1664ed4450db729c909b708086a54d77acf7848f28196ab88ad46f659d3d3cff0ecec2acf7b116bf2c32952893e01447847b1cc506d1bd4cef250db5c9427f20c266a1d9838541bac00841ac96f7be7d25d58c30af06bda026de39bab9f59cbf85bb63fe28396ca1e95bbb215e93dcb4fadd36301698744838e70a0cf0f42e1d60314427eaa81c6d95f1223c4c5465a"}, {0xa8, 0x119, 0x3, "16366822d53a40eef1933ea16a518873e34e2f2a5c5ef063d9bf0f3fecc5a3d3f4f04d782d5331bde9de9a1b69425c820e66b4ccc6c3d6165a67cefca616eaecbb5e84c0242cb028f8376ae1d3d221b9892b96fff7545c48d364b53fa66c0113b4972259fd591eb57cb8e29aa6b7154a0a57f7bfbccfa93ecbe0a0f78bca712613cd01f6b807662b647ea0b310323c96171f93"}, {0x78, 0x119, 0x7, "474be9abe09e8bbbdc32825453ed2302e67253ce620d64a373a1251bc4b872d132d3c5cfd97191aaa3ba58eb99ff507773f8476d3e8150493d5a845023013e52ae73a468cce6e063507a9712f9bb806954ed83190986e579dd010fb82cc4941daa8c"}, {0xb8, 0x88, 0x80, "97367da06a9a5dd7f4da20e2f20a9d5e1d0cb17a4de5f368d739dc191f712ea7a9a605789a00d8b3060aa780ed2211522a8727af52ef66deceb61371b02058bb6fe7e15f08cb8ffb4c4b4b8d8f79f8264f08a8326020017af550bb36489281aabda5883ad2d4125362d2cdd765b903138cd665bc50607f9117145ba6895142b769cd9e09a2ce390a22f4e271ab5d1cc1926a81600de414c5f9d34879618dd478b5d0"}, {0x20, 0x114, 0x7, "524f9c089212f80792"}, {0x58, 0x9e, 0x0, "c669257333a1dd1a96fbff213f3ec711541f392947ae209f12aa44729cf6f10be824db982b636267d65538473d5e759daed785046b2d516518b0caaa10afc3447d8cea75"}, {0x110, 0x104, 0xfff, "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"}], 0x440}}], 0x5, 0x4004000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 23:16:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:16:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:16:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfe800000, @loopback}, 0x1c) 23:16:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x46a6ed21, @loopback}, 0x1c) 23:16:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc00, @loopback}, 0x1c) 23:16:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:16:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x50000000, @loopback}, 0x1c) 23:16:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfe80, @loopback}, 0x1c) [ 1259.850640] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:16:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x2000000, @loopback}, 0x1c) [ 1259.946647] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:16:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5e000000, @loopback}, 0x1c) 23:16:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfec00000, @loopback}, 0x1c) [ 1260.020080] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:16:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1260.123855] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1260.138886] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:16:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xf6ffffff00000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:16:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfec0, @loopback}, 0x1c) 23:16:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x6535d082, @loopback}, 0x1c) [ 1260.210543] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1260.285624] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1260.719781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=8945 comm=syz-executor.3 [ 1279.153294] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1279.161840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:16:31 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:16:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x3000000, @loopback}, 0x1c) 23:16:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffff000000000000, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:16:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:16:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xff000000, @loopback}, 0x1c) 23:16:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff00, @loopback}, 0x1c) 23:16:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:16:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x82d03565, @loopback}, 0x1c) [ 1279.177803] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1279.183928] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1279.204747] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:16:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x91ffffff, @loopback}, 0x1c) 23:16:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xff0f0000, @loopback}, 0x1c) 23:16:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff0f, @loopback}, 0x1c) 23:16:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4000000, @loopback}, 0x1c) [ 1279.260381] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1279.283714] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:16:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe8030000, @loopback}, 0x1c) 23:16:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x1000000, @loopback}, 0x1c) 23:16:31 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:16:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1279.344784] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:16:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:16:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xf4010000, @loopback}, 0x1c) 23:16:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x2, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1279.387543] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:16:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x2000000, @loopback}, 0x1c) [ 1279.471295] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1279.512932] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:16:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xffffff91, @loopback}, 0x1c) 23:16:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xf5ffffff, @loopback}, 0x1c) 23:16:47 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:16:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1294.892370] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:16:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3000000, @loopback}, 0x1c) 23:16:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x7, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:16:47 executing program 3: r0 = getpid() r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x101}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'gretap0\x00', {0x2, 0x0, @initdev}}) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000180)) 23:16:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5000000, @loopback}, 0x1c) [ 1294.919975] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1294.937510] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:16:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc000000, @loopback}, 0x1c) 23:16:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffff5, @loopback}, 0x1c) 23:16:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6000000, @loopback}, 0x1c) 23:16:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4000000, @loopback}, 0x1c) [ 1295.030665] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1295.051302] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1295.110216] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:16:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x2}}, 0x1c) 23:16:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1295.153904] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:16:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5000000, @loopback}, 0x1c) 23:16:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfe800000, @loopback}, 0x1c) 23:16:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x3}}, 0x1c) 23:16:47 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:16:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4}}, 0x1c) 23:16:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x7000000, @loopback}, 0x1c) 23:16:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1295.430543] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1295.441914] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1295.447824] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1295.483241] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:17:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x8, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:17:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5}}, 0x1c) 23:17:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x8000000, @loopback}, 0x1c) 23:17:02 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:17:02 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:17:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfec00000, @loopback}, 0x1c) 23:17:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:17:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x6000000, @loopback}, 0x1c) [ 1310.419927] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1310.450452] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:17:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x6}}, 0x1c) 23:17:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe000000, @loopback}, 0x1c) [ 1310.517111] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:17:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x7000000, @loopback}, 0x1c) 23:17:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff000000, @loopback}, 0x1c) 23:17:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x410, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1310.604084] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1310.613910] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1310.657995] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1310.690704] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:17:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x9, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:17:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:17:25 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:17:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x18020000, @loopback}, 0x1c) 23:17:25 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:17:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff0f0000, @loopback}, 0x1c) 23:17:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8000000, @loopback}, 0x1c) 23:17:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x7}}, 0x1c) [ 1332.922856] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1332.935254] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1332.973070] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:17:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x8}}, 0x1c) 23:17:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe000000, @loopback}, 0x1c) 23:17:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffff91, @loopback}, 0x1c) 23:17:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1d3004, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file2\x00') pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000240)='./file0\x00') mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x8, &(0x7f0000000200)='^},\x00') [ 1333.083522] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:17:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe}}, 0x1c) 23:17:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xa, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:17:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x1b5f1d35, @loopback}, 0x1c) 23:17:41 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) r1 = signalfd(r0, &(0x7f0000000240)={[0x101]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x401}}, './file0\x00'}) ioctl$SNAPSHOT_FREE(r2, 0x3305) sendfile(r0, r0, 0x0, 0x3) r3 = socket$inet(0x2, 0x3, 0x80) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r3, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r4}, 0xc) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="4082c3394d93100004004e25e63a32f64c8f20bbf6e799f31edd624711e8cbab2a3a4cda9ee1de6011a378c7a35def55ddf78ad65ca4ec56fefb5f3b31b49fb7cc839ea305958598b61bde517f56d147005c38ff70f04f658bfa697530907762850fbddcd2dc813d4a55a52fc760833148ed8dc353a01f7b879bcd0dfae2feb96892111f4eb4a11f6b05b1e2939e08ce5118c50cc6b739426ded55c8c070d9dc10bbe5a65f0b0a87cffd1e343a5706bd553ddf2ea2", @ANYRES16=r6, @ANYBLOB="010000000000000000000c0000000c00018008000100", @ANYRES32=r8, @ANYBLOB="200003801c0003801800018009000200242d2d7b000000000800010000000000"], 0x40}}, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @xdp={0x2c, 0xf, r4, 0x25}, @can={0x1d, r8}, @qipcrtr={0x2a, 0x3, 0x8000}, 0x4, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)='team_slave_1\x00', 0xecd4, 0x8, 0x9708}) r9 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r9, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) 23:17:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x18020000, @loopback}, 0x1c) 23:17:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:17:41 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:17:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfffffff5, @loopback}, 0x1c) [ 1349.407786] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1349.419971] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1349.428950] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:17:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x48}}, 0x1c) [ 1349.448273] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1353.987450] Bluetooth: hci1: command 0x0409 tx timeout [ 1356.035445] Bluetooth: hci1: command 0x041b tx timeout [ 1358.084093] Bluetooth: hci1: command 0x040f tx timeout [ 1359.547232] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1359.548925] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1359.554055] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1359.592353] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1359.594095] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1359.596720] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1360.131448] Bluetooth: hci1: command 0x0419 tx timeout 23:18:07 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) r1 = signalfd(r0, &(0x7f0000000240)={[0x101]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x401}}, './file0\x00'}) ioctl$SNAPSHOT_FREE(r2, 0x3305) sendfile(r0, r0, 0x0, 0x3) r3 = socket$inet(0x2, 0x3, 0x80) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r3, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r4}, 0xc) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="4082c3394d93100004004e25e63a32f64c8f20bbf6e799f31edd624711e8cbab2a3a4cda9ee1de6011a378c7a35def55ddf78ad65ca4ec56fefb5f3b31b49fb7cc839ea305958598b61bde517f56d147005c38ff70f04f658bfa697530907762850fbddcd2dc813d4a55a52fc760833148ed8dc353a01f7b879bcd0dfae2feb96892111f4eb4a11f6b05b1e2939e08ce5118c50cc6b739426ded55c8c070d9dc10bbe5a65f0b0a87cffd1e343a5706bd553ddf2ea2", @ANYRES16=r6, @ANYBLOB="010000000000000000000c0000000c00018008000100", @ANYRES32=r8, @ANYBLOB="200003801c0003801800018009000200242d2d7b000000000800010000000000"], 0x40}}, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @xdp={0x2c, 0xf, r4, 0x25}, @can={0x1d, r8}, @qipcrtr={0x2a, 0x3, 0x8000}, 0x4, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)='team_slave_1\x00', 0xecd4, 0x8, 0x9708}) r9 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r9, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) 23:18:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x2}}, 0x1c) 23:18:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xb, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:18:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:18:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x2f2612d7, @loopback}, 0x1c) 23:18:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40000000, @loopback}, 0x1c) 23:18:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x50}}, 0x1c) 23:18:07 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1375.371213] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1375.392014] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1375.395992] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:18:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x56}}, 0x1c) 23:18:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x3}}, 0x1c) [ 1375.493498] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:18:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x351d5f1b, @loopback}, 0x1c) 23:18:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40020000, @loopback}, 0x1c) 23:18:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1375.589025] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1375.608919] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:18:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5e}}, 0x1c) [ 1375.643918] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:18:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4}}, 0x1c) 23:18:07 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:18:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x9, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:18:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x40000000, @loopback}, 0x1c) [ 1375.870714] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1375.879103] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:18:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:18:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5}}, 0x1c) 23:18:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x50000000, @loopback}, 0x1c) 23:18:25 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:18:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_io_uring_setup(0x24, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5}, 0x443c) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=r4, @ANYBLOB="000001106510ef0000000000e709d4864fe18687de35bedad5e017c5032b5eebded69e8b85cb522fb93472310bfc8d"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x2010, r1, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_setup(0x457f, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x3, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000180)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, {0x0, r8}}, 0x0) syz_io_uring_submit(0x0, r7, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001600)={&(0x7f00000002c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/218, 0xda}, {&(0x7f0000001440)=""/150, 0x96}], 0x3, &(0x7f0000001500)=""/242, 0xf2}, 0x0, 0x100, 0x0, {0x2, r8}}, 0x7) syz_io_uring_submit(r5, r3, &(0x7f0000000180)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, r6, 0x0, &(0x7f0000000200)="025c0fc4949f4657e681219ab079529f27585bd226c509d82e4afcefe46e7ff952874283fe6b248fd0709edbf1606c5d35514694844d9fc39ea87ce18541b36e3dccbe92a734ae6270d2edf96be0d8411f1e15edba1ae7", 0x57, 0x10000, 0x0, {0x0, r8}}, 0x8) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r9, r9, 0x0, 0x3) syncfs(r0) 23:18:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x10, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:18:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x40020000, @loopback}, 0x1c) 23:18:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfc}}, 0x1c) [ 1393.060528] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1393.106535] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:18:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1f4}}, 0x1c) 23:18:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x6}}, 0x1c) 23:18:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x5e000000, @loopback}, 0x1c) 23:18:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x48000000, @loopback}, 0x1c) 23:18:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x218}}, 0x1c) 23:18:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x79ff269c, @loopback}, 0x1c) 23:18:25 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={0x0, 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:18:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:18:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x91ffffff, @loopback}, 0x1c) [ 1393.338179] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1393.363368] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:18:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x700, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:18:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x240}}, 0x1c) 23:18:42 executing program 3: r0 = open_tree(0xffffffffffffffff, 0x0, 0x80980) sendmsg$nl_generic(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4044}, 0x11) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x50, 0xffffffffffffffff, 0x8ec8d000) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00"}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x47502, &(0x7f00000001c0)={0x0, 0x0, 0x20, 0x1, 0x1cf}) r2 = socket$inet(0x2, 0xa, 0x0) r3 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000002a40)) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000001900)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000700)={0x0, 0x2, &(0x7f00000006c0)=[0xffffffffffffffff]}, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) syz_open_dev$vcsa(&(0x7f0000004700), 0xa8dc, 0x400) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="cfb51db7b4aef657d69b7d6f8d9fa8bedaa6006ddceb933f3cf4ef90895513108dee8630697149f293a1d1f7213993307208d16219b1bd3754ae85fa55", 0x3d, 0xfffe) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000580)={r5, r4, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000340)=ANY=[@ANYRES64=r4, @ANYBLOB="c0ffffff0900000000000000000036150000000002000000000000000500000000000000040000007747000004000000e0ffffff000100000000000005000000000000000900000000000000070000000000002020000000000000000000000000000000000000000000000000000000000000000000000000e5b2998ba1246ab9aa560d8723941e295a1a66b77c4f4c10180f233aec2a7effad8018156014b43e2e4731de4627417e6da6f597e03af9f904556451e6adb78cb39e20f66cac0519a379132920b7ce6e77927494b5db455cfc040250ef08be7e342de6c39992b80ae499a69f2736dc8a91619d6dc1"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 23:18:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x9a0937c2, @loopback}, 0x1c) 23:18:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x7}}, 0x1c) 23:18:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4b918501, @loopback}, 0x1c) 23:18:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:18:42 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={0x0, 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1410.599675] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:18:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x8}}, 0x1c) [ 1410.619451] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:18:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x9c26ff79, @loopback}, 0x1c) 23:18:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x300}}, 0x1c) [ 1410.674634] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:18:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x50000000, @loopback}, 0x1c) 23:18:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xc237099a, @loopback}, 0x1c) [ 1410.744449] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1410.753048] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:18:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x3e8}}, 0x1c) 23:18:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe}}, 0x1c) 23:18:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1410.884872] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1410.932008] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1410.939957] device veth0_vlan entered promiscuous mode [ 1411.884977] device veth0_vlan entered promiscuous mode 23:18:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x500}}, 0x1c) 23:18:57 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x56000000, @loopback}, 0x1c) 23:18:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x900, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:18:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xe8030000, @loopback}, 0x1c) 23:18:57 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={0x0, 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:18:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd28, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:18:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x50}}, 0x1c) 23:18:57 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0}, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x120, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x50, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x0, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x3c}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x351d}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PROP_WIN={0xfffffffffffffeeb, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_BEARER={0x70, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg1\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10b8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x4000000}, 0x801) r1 = msgget$private(0x0, 0x8c) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x18, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x630]}}]}]}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4000010) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x8, 0x70bd2c, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "c0f109b9715ad95650073e8994"}]}, 0x28}, 0x1, 0x0, 0x0, 0x48000}, 0x4000800) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000001c40), 0x4) msgsnd(r1, &(0x7f0000000040)={0x0, "6bed0dd4cde8a598eb9800c3ef3763b967cfc964c13d7bbd6fde1545a2"}, 0x25, 0x800) setsockopt$inet6_group_source_req(r4, 0x29, 0x2f, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r4, &(0x7f0000004d00), 0x2f, 0x0) [ 1425.722894] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1425.731077] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1425.749503] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:18:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5e}}, 0x1c) 23:18:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5e000000, @loopback}, 0x1c) 23:18:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xf4010000, @loopback}, 0x1c) 23:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x600}}, 0x1c) [ 1425.832359] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1425.857677] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:18:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1425.961952] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:19:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xf5ffffff, @loopback}, 0x1c) 23:19:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x700}}, 0x1c) 23:19:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xa00, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:19:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') write$bt_hci(r1, &(0x7f0000001300)=ANY=[@ANYBLOB="013820230000000012dbe6b4d1d76368674a3ef38585c16ef75824ef9d0ed8947ff4cc2517873f"], 0x27) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000003000/0x1000)=nil, &(0x7f0000003000/0x4000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000100)="ae19e9710b6051e8263ceb95745b9775c626dd24dbf3e40500000000000000c7f676e557918569eff15a06ecbe43eaa4c7414d737e6624", 0x37, r1}, 0x68) r2 = add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000640)=ANY=[@ANYRES64=r3], 0x48, r2) add_key$keyring(&(0x7f0000000240), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r2) socket$packet(0x11, 0x2, 0x300) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 23:19:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x91ffffff, @loopback}, 0x1c) 23:19:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1004, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:19:12 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:19:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfc}}, 0x1c) [ 1440.686579] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1440.713829] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1440.719808] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:19:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:19:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x1f4}}, 0x1c) 23:19:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe00}}, 0x1c) 23:19:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc000000, @loopback}, 0x1c) 23:19:13 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xb8ff0000, @loopback}, 0x1c) [ 1440.911254] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1440.912466] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:19:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1441.019655] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:19:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfe800000, @loopback}, 0x1c) [ 1441.047693] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:19:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x218}}, 0x1c) 23:19:13 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:19:13 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xd712262f, @loopback}, 0x1c) [ 1441.155507] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1441.187312] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1441.195869] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:19:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:19:29 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1802}}, 0x1c) 23:19:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfec00000, @loopback}, 0x1c) 23:19:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xe8030000, @loopback}, 0x1c) 23:19:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80)={r9, r10+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r7, 0xffffffffffff56c0, 0x0, 0x1f}, 0x2) creat(&(0x7f0000000100)='./file0\x00', 0x32) 23:19:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x240}}, 0x1c) 23:19:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xb00, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1457.090135] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1457.108840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1457.197513] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4000}}, 0x1c) 23:19:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x300}}, 0x1c) 23:19:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff000000, @loopback}, 0x1c) 23:19:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xf4010000, @loopback}, 0x1c) 23:19:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80)={r9, r10+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r7, 0xffffffffffff56c0, 0x0, 0x1f}, 0x2) creat(&(0x7f0000000100)='./file0\x00', 0x32) 23:19:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80)={r9, r10+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r7, 0xffffffffffff56c0, 0x0, 0x1f}, 0x2) creat(&(0x7f0000000100)='./file0\x00', 0x32) 23:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4002}}, 0x1c) 23:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4800}}, 0x1c) 23:19:45 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x3e8}}, 0x1c) 23:19:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x1020, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:19:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:19:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5000}}, 0x1c) 23:19:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80)={r9, r10+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r7, 0xffffffffffff56c0, 0x0, 0x1f}, 0x2) creat(&(0x7f0000000100)='./file0\x00', 0x32) 23:19:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff0f0000, @loopback}, 0x1c) 23:19:45 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xf5ffffff, @loopback}, 0x1c) 23:19:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1473.391712] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1473.424676] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:19:45 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x500}}, 0x1c) 23:19:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5600}}, 0x1c) [ 1473.482595] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:19:45 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfc000000, @loopback}, 0x1c) 23:19:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffff91, @loopback}, 0x1c) 23:19:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x280d, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:19:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5e00}}, 0x1c) 23:19:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x2000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1473.579652] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:19:45 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x600}}, 0x1c) [ 1473.595472] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:19:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80)={r9, r10+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r7, 0xffffffffffff56c0, 0x0, 0x1f}, 0x2) 23:19:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1473.713218] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1473.797638] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1477.955436] Bluetooth: hci1: command 0x0406 tx timeout 23:20:01 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:20:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfffffff5, @loopback}, 0x1c) 23:20:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80)={r9, r10+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:20:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x700}}, 0x1c) 23:20:01 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfe800000, @loopback}, 0x1c) 23:20:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x80fe}}, 0x1c) 23:20:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x2010, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:20:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1489.145766] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1489.182627] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1489.207787] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:20:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xedc0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:20:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xb8ff}}, 0x1c) 23:20:01 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb8"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:20:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe00}}, 0x1c) 23:20:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x2}}, 0x1c) 23:20:01 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfec00000, @loopback}, 0x1c) 23:20:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1489.419732] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1489.441949] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1489.503015] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1489.550734] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:20:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xff000000, @loopback}, 0x1c) 23:20:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x3}}, 0x1c) 23:20:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:20:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80), &(0x7f0000001cc0)={[0x800]}, 0x8) 23:20:17 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb8"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:20:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x80000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:20:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x1802}}, 0x1c) 23:20:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xc0fe}}, 0x1c) [ 1505.517046] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1505.530103] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:20:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe803}}, 0x1c) [ 1505.564099] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:20:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xff0f0000, @loopback}, 0x1c) [ 1505.620549] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:20:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4000}}, 0x1c) 23:20:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf401}}, 0x1c) 23:20:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x1000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:20:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:20:17 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb8"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1505.777336] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1505.786297] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1505.819182] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:20:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfc00}}, 0x1c) 23:20:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80), &(0x7f0000001cc0)={[0x800]}, 0x8) 23:20:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4002}}, 0x1c) 23:20:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x2000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:20:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xffffff91, @loopback}, 0x1c) 23:20:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4}}, 0x1c) 23:20:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfe80}}, 0x1c) 23:20:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:20:35 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b55952272"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:20:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80), &(0x7f0000001cc0)={[0x800]}, 0x8) 23:20:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {r8, 0x1000}], 0x9, &(0x7f0000001c80)={r9, r10+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 1523.299715] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1523.306512] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1523.317632] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:20:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5000}}, 0x1c) 23:20:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfec0}}, 0x1c) [ 1523.363298] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:20:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffff5, @loopback}, 0x1c) [ 1523.449472] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1523.456236] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:20:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff00}}, 0x1c) 23:20:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5e00}}, 0x1c) 23:20:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x7000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:20:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5}}, 0x1c) 23:20:51 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x2}}, 0x1c) 23:20:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r8, r9+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:20:51 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b55952272"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:20:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1539.578558] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1539.606050] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:20:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x80fe}}, 0x1c) 23:20:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:20:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x3}}, 0x1c) 23:20:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff0f}}, 0x1c) 23:20:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xc0fe}}, 0x1c) [ 1539.881746] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:20:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:20:52 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b55952272"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:20:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xffb8}}, 0x1c) 23:20:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe803}}, 0x1c) [ 1540.047885] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:20:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4}}, 0x1c) [ 1540.082296] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:21:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:21:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x8000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1556.189172] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:21:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r8, r9+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:21:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x20000}}, 0x1c) 23:21:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5}}, 0x1c) 23:21:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xf401}}, 0x1c) 23:21:08 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27ea"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:21:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x6}}, 0x1c) [ 1556.241832] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:21:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x6}}, 0x1c) 23:21:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfc00}}, 0x1c) 23:21:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:21:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1000000}}, 0x1c) 23:21:08 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27ea"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:21:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x7}}, 0x1c) [ 1556.434839] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:21:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfe80}}, 0x1c) 23:21:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x8}}, 0x1c) 23:21:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x9000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:21:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x7}}, 0x1c) 23:21:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x2000000}}, 0x1c) 23:21:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfec0}}, 0x1c) 23:21:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="bd5aea8b8c2fbe2d2d2ebd5b2689660c", 0x10) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r8, r9+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:21:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:21:25 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27ea"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:21:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe}}, 0x1c) [ 1573.166308] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:21:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x3000000}}, 0x1c) 23:21:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00}}, 0x1c) [ 1573.242146] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:21:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x48}}, 0x1c) 23:21:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4000000}}, 0x1c) 23:21:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:21:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff0f}}, 0x1c) 23:21:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r8, r9+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:21:25 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a79"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:21:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x8}}, 0x1c) 23:21:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xa000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:21:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x1000000}}, 0x1c) 23:21:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x50}}, 0x1c) 23:21:41 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a79"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:21:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:21:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r8, r9+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:21:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5000000}}, 0x1c) [ 1589.329708] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1589.374428] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:21:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r7, r8+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:21:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x2000000}}, 0x1c) 23:21:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:21:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x56}}, 0x1c) 23:21:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x6000000}}, 0x1c) [ 1589.539119] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:21:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x3000000}}, 0x1c) 23:21:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x7000000}}, 0x1c) 23:22:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5e}}, 0x1c) 23:22:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xb000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:22:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe}}, 0x1c) 23:22:00 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a79"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:22:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:22:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x8000000}}, 0x1c) 23:22:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r7, r8+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:22:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4000000}}, 0x1c) [ 1608.250606] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:22:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe000000}}, 0x1c) 23:22:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5000000}}, 0x1c) 23:22:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfc}}, 0x1c) 23:22:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r7, r8+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:22:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x6000000}}, 0x1c) 23:22:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x16e59541}}, 0x1c) 23:22:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x18020000}}, 0x1c) 23:22:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x29dc5490}}, 0x1c) 23:22:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x40000000}}, 0x1c) [ 1608.810695] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:22:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x7000000}}, 0x1c) 23:22:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x10000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:22:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:22:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x50}}, 0x1c) 23:22:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x40020000}}, 0x1c) 23:22:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac139"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:22:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1f4}}, 0x1c) 23:22:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r7, r8+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 1626.099807] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1626.121300] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:22:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x218}}, 0x1c) 23:22:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:22:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x8000000}}, 0x1c) 23:22:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4195e516}}, 0x1c) [ 1626.263868] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:22:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x240}}, 0x1c) 23:22:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac139"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:22:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:22:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe000000}}, 0x1c) [ 1626.597948] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1626.632041] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:22:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x48000000}}, 0x1c) 23:22:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5e}}, 0x1c) 23:22:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x20000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:22:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r7, r8+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:22:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x18020000}}, 0x1c) 23:22:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:22:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x300}}, 0x1c) 23:22:34 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac139"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1642.225456] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:22:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x21eda646}}, 0x1c) 23:22:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x3e8}}, 0x1c) [ 1642.334944] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:22:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x50000000}}, 0x1c) 23:22:34 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d09"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:22:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r7, r8+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:22:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x500}}, 0x1c) 23:22:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1642.574969] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:22:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x40000000}}, 0x1c) 23:22:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x56000000}}, 0x1c) 23:22:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:22:52 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744e45612d3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d09"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:22:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x20100000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:22:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfc}}, 0x1c) 23:22:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r4, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {r4, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r5, r6+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:22:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x40020000}}, 0x1c) 23:22:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x58748369}}, 0x1c) 23:22:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x600}}, 0x1c) [ 1659.878643] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1659.914143] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:22:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x46a6ed21}}, 0x1c) 23:22:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5e000000}}, 0x1c) 23:22:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x700}}, 0x1c) 23:22:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x8cffffff, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:22:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r1 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r2, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {r2, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r1, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r3, r4+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:22:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:22:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x50000000}}, 0x1c) 23:22:52 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d09"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1660.189099] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1660.221803] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:23:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x1f4}}, 0x1c) 23:23:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe00}}, 0x1c) 23:23:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:23:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xc0ed0000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:23:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x69837458}}, 0x1c) 23:23:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5e000000}}, 0x1c) 23:23:08 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:23:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r1 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r2, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {r2, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r1, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r3, r4+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 1676.132799] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1676.160143] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:23:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r1 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {0xffffffffffffffff, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {0xffffffffffffffff, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r1, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r2, r3+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:23:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x6535d082}}, 0x1c) 23:23:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:23:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x9054dc29}}, 0x1c) 23:23:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1802}}, 0x1c) 23:23:08 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1676.356773] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:23:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x82d03565}}, 0x1c) [ 1676.408034] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:23:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x91ffffff}}, 0x1c) 23:23:25 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:23:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:23:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r1 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {0xffffffffffffffff, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {0xffffffffffffffff, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r1, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r2, r3+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:23:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4000}}, 0x1c) 23:23:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x91ffffff}}, 0x1c) 23:23:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x218}}, 0x1c) 23:23:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xf6ffffff, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:23:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xb8ff0000}}, 0x1c) [ 1693.618090] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1693.641814] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:23:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe8030000}}, 0x1c) 23:23:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4002}}, 0x1c) 23:23:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe8030000}}, 0x1c) 23:23:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:23:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xffff0000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:23:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xf4010000}}, 0x1c) [ 1693.838714] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:23:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4800}}, 0x1c) 23:23:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:23:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf4010000}}, 0x1c) 23:23:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x240}}, 0x1c) 23:23:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r1 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {0xffffffffffffffff, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {0xffffffffffffffff, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r1, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r2, r3+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:23:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xf5ffffff}}, 0x1c) 23:23:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5000}}, 0x1c) 23:23:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xffffff8c, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:23:43 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1711.447984] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:23:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5600}}, 0x1c) 23:23:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf5ffffff}}, 0x1c) 23:23:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfc000000}}, 0x1c) 23:23:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:23:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5e00}}, 0x1c) 23:23:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xfffffff6, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:23:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfe800000}}, 0x1c) 23:23:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfc000000}}, 0x1c) [ 1711.720350] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:23:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x80fe}}, 0x1c) 23:23:44 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1711.813530] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:24:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x300}}, 0x1c) 23:24:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:24:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r1, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {r1, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r2, r3+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:24:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xb8ff}}, 0x1c) 23:24:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfec00000}}, 0x1c) 23:24:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xedc000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:24:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfe800000}}, 0x1c) 23:24:03 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1731.521960] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:24:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r1, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {r1, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r2, r3+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:24:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff000000}}, 0x1c) 23:24:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xc0fe}}, 0x1c) 23:24:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfec00000}}, 0x1c) 23:24:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:24:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe803}}, 0x1c) 23:24:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r1, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {r1, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r2, r3+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:24:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x8000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:24:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x3e8}}, 0x1c) 23:24:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff000000}}, 0x1c) 23:24:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x100000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:24:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf401}}, 0x1c) 23:24:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10040000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:24:20 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:24:20 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:24:20 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff0f0000}}, 0x1c) [ 1748.700840] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1748.728687] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:24:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:24:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff0f0000}}, 0x1c) 23:24:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfc00}}, 0x1c) 23:24:21 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:24:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xffffff91}}, 0x1c) 23:24:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:24:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x200000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1748.958059] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:24:39 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:24:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xffffff91}}, 0x1c) 23:24:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x500}}, 0x1c) 23:24:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:24:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfffffff5}}, 0x1c) 23:24:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfe80}}, 0x1c) 23:24:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x700000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:24:39 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1767.170559] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:24:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x100000000000000}}, 0x1c) 23:24:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfec0}}, 0x1c) [ 1767.223349] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:24:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfffffff5}}, 0x1c) 23:24:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x280d0000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:24:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x200000000000000}}, 0x1c) 23:24:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff00}}, 0x1c) 23:24:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x800000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:24:56 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:24:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x20000000000}}, 0x1c) 23:24:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x600}}, 0x1c) 23:24:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x300000000000000}}, 0x1c) 23:24:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:24:56 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff0f}}, 0x1c) 23:24:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x900000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:24:56 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1784.286899] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1784.313743] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:24:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x2000000000000}}, 0x1c) 23:24:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x400000000000000}}, 0x1c) 23:24:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:24:56 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xffb8}}, 0x1c) [ 1784.482345] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:24:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x100000000000000}}, 0x1c) 23:24:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x500000000000000}}, 0x1c) [ 1784.511369] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:24:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xa00000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:25:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:25:11 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:25:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x20000}}, 0x1c) 23:25:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x700}}, 0x1c) 23:25:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x600000000000000}}, 0x1c) 23:25:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x200000000000000}}, 0x1c) 23:25:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xb00000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:25:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1799.487338] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:25:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x300000000000000}}, 0x1c) 23:25:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x700000000000000}}, 0x1c) 23:25:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1000000}}, 0x1c) 23:25:11 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:25:11 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 1799.683585] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:25:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe00}}, 0x1c) 23:25:25 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:25:25 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:25:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x800000000000000}}, 0x1c) 23:25:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:25:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x400000000000000}}, 0x1c) 23:25:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x185914b}}, 0x1c) 23:25:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x1000000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:25:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe00000000000000}}, 0x1c) [ 1813.866619] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:25:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x500000000000000}}, 0x1c) 23:25:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:25:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:25:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x2000000}}, 0x1c) 23:25:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x1802000000000000}}, 0x1c) 23:25:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:25:26 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:25:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x2000000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:25:44 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:25:44 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:25:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x600000000000000}}, 0x1c) 23:25:44 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x3000000}}, 0x1c) 23:25:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x1802}}, 0x1c) 23:25:44 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4000000000000000}}, 0x1c) 23:25:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:25:44 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80), &(0x7f0000001cc0)={[0x800]}, 0x8) [ 1832.673105] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:25:44 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4000000}}, 0x1c) 23:25:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x700000000000000}}, 0x1c) 23:25:45 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4002000000000000}}, 0x1c) 23:25:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:25:45 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5000000}}, 0x1c) 23:25:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x800000000000000}}, 0x1c) [ 1832.937461] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:25:45 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x46a6ed2100000000}}, 0x1c) 23:25:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x2010000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 1832.993144] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:25:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80), &(0x7f0000001cc0)={[0x800]}, 0x8) 23:25:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5000000000000000}}, 0x1c) 23:25:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4000}}, 0x1c) 23:25:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x8cffffff00000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:25:59 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x6000000}}, 0x1c) 23:25:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:25:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe00000000000000}}, 0x1c) 23:25:59 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1847.465564] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:25:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80), &(0x7f0000001cc0)={[0x800]}, 0x8) 23:25:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5e00000000000000}}, 0x1c) 23:25:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(0x0, 0x0, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 1847.593581] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:25:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1802000000000000}}, 0x1c) 23:25:59 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x7000000}}, 0x1c) 23:25:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:25:59 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e3", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:25:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xf6ffffff00000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:25:59 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x8000000}}, 0x1c) 23:26:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(0x0, 0x0, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:26:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4000000000000000}}, 0x1c) 23:26:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(0x0, 0x0, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:26:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4002}}, 0x1c) 23:26:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x836886ff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:26:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x82d0356500000000}}, 0x1c) 23:26:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe000000}}, 0x1c) 23:26:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0xffff000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:26:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc683", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 1863.414854] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:26:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4002000000000000}}, 0x1c) 23:26:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x91ffffff00000000}}, 0x1c) 23:26:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x18020000}}, 0x1c) [ 1863.525731] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:26:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe803000000000000}}, 0x1c) 23:26:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x22, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:26:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:26:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4195e51600000000}}, 0x1c) 23:26:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1b5f1d35}}, 0x1c) [ 1863.764755] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:26:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xf401000000000000}}, 0x1c) [ 1863.856644] 9pnet: Insufficient options for proto=fd 23:26:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xf5ffffff00000000}}, 0x1c) 23:26:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x2c, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:26:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5000}}, 0x1c) 23:26:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:26:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4800000000000000}}, 0x1c) 23:26:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x2f2612d7}}, 0x1c) 23:26:32 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc683", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:26:32 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}], 0x8, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 1880.245763] 9pnet: Insufficient options for proto=fd [ 1880.269504] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:26:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5000000000000000}}, 0x1c) 23:26:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x351d5f1b}}, 0x1c) 23:26:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 23:26:32 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc683", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:26:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5600000000000000}}, 0x1c) 23:26:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:26:32 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}], 0x7, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:26:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfe80000000000000}}, 0x1c) 23:26:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x22, {'wfdno', 0x3d, r0}}) 23:26:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1880.716094] 9pnet: Insufficient options for proto=fd 23:26:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5e00}}, 0x1c) 23:26:47 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebb", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:26:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:26:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfec0000000000000}}, 0x1c) 23:26:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x40000000}}, 0x1c) 23:26:47 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}, {0xffffffffffffffff, 0x120}], 0x6, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:26:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5e00000000000000}}, 0x1c) 23:26:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x22, r0}}) [ 1895.290206] 9pnet: Insufficient options for proto=fd [ 1895.305323] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1895.348128] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:26:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x6983745800000000}}, 0x1c) 23:26:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x2c, r0}}) 23:26:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x1c) 23:26:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:26:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x40020000}}, 0x1c) [ 1895.454482] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1895.456243] 9pnet: Insufficient options for proto=fd 23:26:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:26:47 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}, {r0, 0x1022}], 0x5, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:26:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x9054dc2900000000}}, 0x1c) [ 1895.551473] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff0f000000000000}}, 0x1c) 23:27:02 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebb", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:27:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x91ffffff00000000}}, 0x1c) 23:27:02 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4409}], 0x4, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:27:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x48000000}}, 0x1c) 23:27:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x80fe}}, 0x1c) 23:27:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:27:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x22}) [ 1909.869593] 9pnet: Insufficient options for proto=fd [ 1909.898265] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:02 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}, {0xffffffffffffffff, 0x200}], 0x3, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:27:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xffffffff00000000}}, 0x1c) 23:27:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xb8ff000000000000}}, 0x1c) 23:27:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4b918501}}, 0x1c) 23:27:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:27:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe803000000000000}}, 0x1c) [ 1910.020254] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:02 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebb", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:27:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1910.214790] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1910.236329] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x2}}) 23:27:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) 23:27:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:27:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0, 0x80}], 0x2, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:27:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf401000000000000}}, 0x1c) 23:27:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x50000000}}, 0x1c) 23:27:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:27:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xc0fe}}, 0x1c) 23:27:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}], 0x1, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 1926.377985] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf5ffffff00000000}}, 0x1c) 23:27:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x56000000}}, 0x1c) [ 1926.528617] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}], 0x1, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:27:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 23:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:27:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x7}}) 23:27:42 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:27:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5e000000}}, 0x1c) 23:27:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe803}}, 0x1c) 23:27:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x3}}, 0x1c) [ 1950.118977] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfe80000000000000}}, 0x1c) 23:27:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x91ffffff}}, 0x1c) 23:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff866883, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1950.258892] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:42 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:27:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfec0000000000000}}, 0x1c) 23:27:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xb8ff0000}}, 0x1c) 23:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfff7ffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:27:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xd712262f}}, 0x1c) 23:27:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe8030000}}, 0x1c) 23:27:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:27:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff00000000000000}}, 0x1c) 23:27:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x8}}) 23:27:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x4}}, 0x1c) 23:27:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:27:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xf401}}, 0x1c) 23:27:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}], 0x1, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 1966.338065] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff0f000000000000}}, 0x1c) 23:27:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf4010000}}, 0x1c) [ 1966.394368] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffe000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:27:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf5ffffff}}, 0x1c) 23:27:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xffffffff00000000}}, 0x1c) 23:27:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffff7ff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:27:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:27:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x2}}, 0x1c) 23:27:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfc000000}}, 0x1c) 23:27:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffbff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 1966.617824] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:27:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfe800000}}, 0x1c) 23:28:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfec00000}}, 0x1c) 23:28:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x3}}, 0x1c) 23:28:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x9}}) 23:28:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfc00}}, 0x1c) 23:28:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x5}}, 0x1c) 23:28:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:28:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:28:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:28:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff000000}}, 0x1c) [ 1983.260727] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:28:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x6}}, 0x1c) [ 1983.301061] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:28:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff0f0000}}, 0x1c) 23:28:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:28:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x7}}, 0x1c) 23:28:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:28:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x4}}, 0x1c) 23:28:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfe80}}, 0x1c) 23:28:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xffffff91}}, 0x1c) 23:28:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:28:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:28:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xa}}) 23:28:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfffffff5}}, 0x1c) [ 1999.612524] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 1999.634943] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:28:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x20000000000}}, 0x1c) 23:28:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:28:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:28:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x2000000000000}}, 0x1c) [ 1999.744585] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:28:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x100000000000000}}, 0x1c) 23:28:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:28:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x200000000000000}}, 0x1c) 23:28:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x300000000000000}}, 0x1c) 23:28:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xb}}) 23:28:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfec0}}, 0x1c) 23:28:48 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:28:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 23:28:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:28:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:28:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x5}}, 0x1c) [ 2015.938569] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:28:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x400000000000000}}, 0x1c) [ 2016.038253] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:28:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:28:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x500000000000000}}, 0x1c) 23:28:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:28:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:28:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x600000000000000}}, 0x1c) 23:28:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:28:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x700000000000000}}, 0x1c) [ 2016.341839] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2016.370320] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:02 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r0}], 0x2, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:29:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x10}}) 23:29:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x800000000000000}}, 0x1c) 23:29:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x9}}, 0x1c) 23:29:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:02 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:29:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x6}}, 0x1c) 23:29:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00}}, 0x1c) [ 2030.425859] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe00000000000000}}, 0x1c) [ 2030.450083] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:02 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, &(0x7f0000001c80)={r1, r2+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:29:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1802000000000000}}, 0x1c) 23:29:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:02 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{}], 0x1, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 2030.636128] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2030.672520] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:02 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e0", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:29:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x1b5f1d3500000000}}, 0x1c) 23:29:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4000000000000000}}, 0x1c) [ 2030.851967] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2030.921139] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x90) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') r3 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x52}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r4, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r5, r5, 0x0, 0x3) clone3(&(0x7f0000000400)={0x4080, &(0x7f00000000c0), &(0x7f0000000240), &(0x7f0000000280), {0x3b}, &(0x7f00000002c0)=""/74, 0x4a, &(0x7f0000000340)=""/125, &(0x7f00000003c0)=[r3, r4, r3], 0x3, {r5}}, 0x58) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1, {0x9}}, './file1\x00'}) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000380)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@uname={'uname', 0x3d, '{'}}], [{@obj_type={'obj_type', 0x3d, '{{^$'}}, {@uid_gt={'uid>', r7}}, {@euid_lt={'euid<', r7}}, {@hash}, {@permit_directio}, {@appraise}, {@appraise}, {@obj_type={'obj_type', 0x3d, '@&[&'}}]}}) sendmsg$nl_generic(r6, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xf4, 0x23, 0x2, 0x70bd2b, 0x25dfdbfc, {0x2}, [@generic="6edd3b798826bf0b312b4a6c7f324a57b2f3583b49dc2fe91585a7e6610b6135e2b4dd68372705f553cd7a7c6786feb2b6db450704f9742fbd4e390183d6eef42a2667de48f39cbac079763c5beece9ef986c7b6f7d5a42489739e0c8592e16193ea33f79bc14f3d26751ccfc8f4a58f626c5ef53562e2582ec0927d2bcdc0528f80ab0bc419109e42c9e2e5531a2f996eb641e6a3ac33f8b849a90e439525ed082ee9060f36ad549e809645591a81a82a8d32fbdf72021603134fb14f4688", @nested={0xc, 0x2d, 0x0, 0x1, [@typed={0x8, 0x4, 0x0, 0x0, @u32=0x7ff}]}, @typed={0x8, 0x11, 0x0, 0x0, @uid=r7}, @nested={0x9, 0x89, 0x0, 0x1, [@generic="593ebc617c"]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000005}, 0x8800) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6a2227e98d9d06946b4f42307472616e733d66642c7266646e6f3d", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) splice(r0, &(0x7f0000000480)=0x4, r5, &(0x7f00000004c0)=0x101, 0x1000, 0x2) 23:29:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4002000000000000}}, 0x1c) 23:29:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{}], 0x1, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:29:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x300}}, 0x1c) 23:29:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:29:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff0f}}, 0x1c) 23:29:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x7}}, 0x1c) [ 2046.780662] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4800000000000000}}, 0x1c) [ 2046.814040] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:19 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:29:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4b91850100000000}}, 0x1c) 23:29:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2047.025863] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',ufdno=', @ANYRES16, @ANYBLOB="5c0f"]) 23:29:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5000000000000000}}, 0x1c) [ 2047.128356] 9pnet: Insufficient options for proto=fd 23:29:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5600000000000000}}, 0x1c) 23:29:19 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e027", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:29:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000180)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:29:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5e00000000000000}}, 0x1c) 23:29:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x8}}, 0x1c) 23:29:35 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:29:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:29:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x1000000}}, 0x1c) 23:29:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{}], 0x1, &(0x7f0000001c80)={r0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:29:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x2}, 0x1c) [ 2062.915991] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x91ffffff00000000}}, 0x1c) [ 2062.959793] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xb8ff000000000000}}, 0x1c) 23:29:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:35 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e027", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:29:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) 23:29:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2063.249217] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2063.825530] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c) 23:29:51 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:29:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x2000000}}, 0x1c) 23:29:51 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xd712262f00000000}}, 0x1c) 23:29:51 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, 0x0, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:29:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) utimes(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180)={{}, {0x0, 0xea60}}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000000)="a6753211e3f1") r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 23:29:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x9}}, 0x1c) [ 2079.591974] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:51 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe803000000000000}}, 0x1c) 23:29:51 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, 0x0, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:29:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x5}, 0x1c) [ 2079.991039] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf401000000000000}}, 0x1c) 23:29:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x6}, 0x1c) 23:29:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:29:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xf5ffffff00000000}}, 0x1c) 23:29:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x7}, 0x1c) [ 2080.143642] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:29:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 23:30:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfe80000000000000}}, 0x1c) 23:30:07 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, 0x0, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:30:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:30:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x7fdc}}, 0x1c) 23:30:07 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:30:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x3000000}}, 0x1c) 23:30:07 executing program 4: prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d66e664a47107293b2566ab4d41aab92c728b8eb8c963e6ad62e3a9bfdd06c46966646e6f3d", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) 23:30:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x8}, 0x1c) [ 2095.314603] 9pnet: Could not find request transport: fæd¤q);%f«MAª¹ 23:30:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xe}, 0x1c) [ 2095.341624] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:30:07 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, &(0x7f0000001c80)={0x0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:30:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfec0000000000000}}, 0x1c) 23:30:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x50}, 0x1c) 23:30:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:30:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') write$P9_RSTAT(r1, &(0x7f0000000240)={0x69, 0x7d, 0x1, {0x0, 0x62, 0x8, 0x40000000, {0x20, 0x4, 0x5}, 0x0, 0xdc7b, 0x7ff, 0x100000001, 0x1, '$', 0x16, 'net/ip_tables_targets\x00', 0x16, 'net/ip_tables_targets\x00', 0x2, '!\''}}, 0x69) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c776607000000c804f2e0eb5ff2e615adbaeb6c6214a5e74acf6e76265a6fca7229e382b0c531cdb064e53fdc48c1191fb6e66c48abb69d53fdb2c73eadc502ac63408ad3", @ANYRESHEX=r0, @ANYBLOB=',\x00']) 23:30:07 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2095.544322] 9pnet: Insufficient options for proto=fd 23:30:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff00000000000000}}, 0x1c) 23:30:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:30:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, &(0x7f0000001c80)={0x0, r1+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:30:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x4000000}}, 0x1c) 23:30:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xff0f000000000000}}, 0x1c) 23:30:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r1, r1, 0x0, 0x3) fcntl$dupfd(r1, 0x406, r0) 23:30:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x5e}, 0x1c) 23:30:23 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:30:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2111.273803] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2111.282729] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2111.286499] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2111.321943] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2111.333364] 9pnet: Insufficient options for proto=fd 23:30:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:30:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x2}, 0x1c) 23:30:23 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2111.381936] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2111.393156] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:30:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xfc}, 0x1c) 23:30:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xffffffff00000000}}, 0x1c) [ 2111.440037] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:30:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x3}, 0x1c) 23:30:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, &(0x7f0000001c80)={0x0, 0x0}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 2111.493468] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:30:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000140)='sched\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:30:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x1f4}, 0x1c) 23:30:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, &(0x7f0000001c80)={0x0, 0x0}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 2111.610201] 9pnet: Insufficient options for proto=fd 23:30:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x2}}, 0x1c) 23:30:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5000000}}, 0x1c) 23:30:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x7, 0x0) clone3(&(0x7f0000000180)={0x1050980, 0x0, 0x0, 0x0, {0x24}, 0x0, 0x0, 0x0, 0x0, 0x0, {r3}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) getsockname(r0, &(0x7f0000000240)=@ax25={{0x3, @rose}, [@null, @remote, @rose, @netrom, @netrom, @remote, @netrom, @null]}, &(0x7f0000000040)=0x80) 23:30:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, &(0x7f0000001c80)={0x0, 0x0}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:30:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:30:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) 23:30:39 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:30:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x218}, 0x1c) [ 2127.607456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2127.622560] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2127.668935] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:30:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5}, 0x1c) 23:30:39 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x240}, 0x1c) 23:30:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{r0}], 0x1, &(0x7f0000001c80)={0x0, r1+60000000}, 0x0, 0x0) 23:30:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2127.756098] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2127.770677] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2127.828848] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:30:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) [ 2127.891809] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:30:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:30:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x3}}, 0x1c) [ 2143.533815] 9pnet: Insufficient options for proto=fd 23:30:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x6000000}}, 0x1c) 23:30:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 23:30:55 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:30:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x7}, 0x1c) 23:30:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x300}, 0x1c) 23:30:55 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2143.552377] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2143.574968] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2143.579693] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:30:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x3e8}, 0x1c) [ 2143.631120] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:30:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x8}, 0x1c) 23:30:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x500}, 0x1c) 23:30:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2143.782407] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2143.801937] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2143.831112] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2143.851057] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:30:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x600}, 0x1c) 23:30:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xe}, 0x1c) 23:30:56 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:30:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2143.925240] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:30:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x700}, 0x1c) [ 2143.945338] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2143.958425] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2143.983731] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:31:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x7000000}}, 0x1c) 23:31:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x4}}, 0x1c) 23:31:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xe00}, 0x1c) 23:31:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:31:11 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x48}, 0x1c) 23:31:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xe40, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') r3 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r2, @ANYBLOB='V`RF+wf', @ANYRESOCT=r3, @ANYRES64=r3]) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053b80)={0x2, [], 0x6, 'A\rZ\'$H>'}) sendfile(r4, r4, 0x0, 0x3) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r5, r5, 0x0, 0x3) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb357b87ae67d5b00d5a28eea29113393d0e1c7391515c7ab7c00", 0x2d}, 0x48, 0xffffffffffffffff) r9 = getegid() keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000300)=@keyring={'key_or_keyring:', r8}) keyctl$chown(0x4, r8, 0xee01, r9) bind$bt_hci(r7, &(0x7f0000000100)={0x1f, 0x4, 0x3}, 0x6) fsetxattr$system_posix_acl(r7, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000010001000000000002000300", @ANYRES32, @ANYBLOB="02000200", @ANYRES32, @ANYBLOB="00000600000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000200000000002000070000000000"], 0x4c, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r5, {r6, r9}}, './file1\x00'}) open_tree(r1, &(0x7f0000000180)='./file1\x00', 0x1000) [ 2159.388925] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2159.432751] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:31:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x50}, 0x1c) 23:31:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x1802}, 0x1c) [ 2159.560027] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:31:11 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x56}, 0x1c) 23:31:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x4000}, 0x1c) [ 2159.823090] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf00000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2159.943412] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2159.967918] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:31:28 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x5}}, 0x1c) 23:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5e}, 0x1c) 23:31:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x8000000}}, 0x1c) 23:31:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x4002}, 0x1c) 23:31:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') r2 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x6, 0xa, &(0x7f0000000780)=[{&(0x7f00000001c0)="3d2d23135d02315326f74b46839e5aece92aa74bc55f9b518944d925254fd9a027d620d8950fae3a9a2d9500f0", 0x2d, 0x3a94}, {&(0x7f0000000240)="4b4e36b3c5b2ed011ee92d92f6c3f052aa1f4f83b324e614fee8c62dbc275c0a2a26879704787c3cf0cfeb21862ce9308975d98dcf7e7886c3d8905bb74dd5fb2363ad0e5446fa0f9a09d4fe5a9a958b61fb67ac94397ebc693eb27d1aa64827c89157", 0x63, 0x4}, {&(0x7f0000000300)="645e2b2d544aa36b28af1c147e3302", 0xf, 0x7f}, {&(0x7f0000000340)="682693d9735544f3ec24b4286b3254ec99d75703da762c7cb71fca33429cf61107cbf94b76f751752bc6de8403eb7b222d19ae57a9e12f1872c361fdc8ab53b8b5333644cb", 0x45, 0x7c000000000}, {&(0x7f00000003c0), 0x0, 0x6}, {&(0x7f0000000400)="6090cb1cdd662d416d08588b6f12fcfe59bd719092fbff", 0x17, 0x857c}, {&(0x7f0000000440)="0213dc956726fb2d136a52d9caf81ca7bbab6ad37674790fa8964312695f97134e8d68f39bd7e649445dd09f3e276ad0f5862d2b7dbf5584c5105bb3c52c7152af54a26d26b18d80be488e450c5a27fb47213876282d2301aa0aaea31256187f6ef06e63b1b1c087958500a9f0316bc73558ceed6560bb0f4ce4186c0b254942c6be49cf9d33ccc4d35f5dca19152426ca17b4771ad2ae998bcf92ea8d9426762390a23f00bb66ec08c5c7a54243ef271cf9039e4146bb40d1d79669fce53926aa8e0f50f39daa971bfa2771b9233d739ae7a93c8cfbe77188806cf8", 0xdc, 0x8}, {&(0x7f0000000540)="8daa79c1327a187932bb6825cb2b60fbfdbb4adf5617e61e72fd0175f959c3dabd27017d9a3b41eb15567659147f0247a49cc585693070e3d59d843aa3eb2f0454dd8aa46f264bfb70509683aa7151bebb1a92222ccce3b7bc8969ceb69555217fb4c2997baa15e9fbdb9c4c49e7be02dd0854468e705f72581267f8fbc192ab9bc17663d7c65cf7afc1fb83aa7532e1c0", 0x91, 0xcb4}, {&(0x7f0000000600)="f799835db5d9178ce75213c460555cda116bc9f2a87a59130d599352d7e38df2a57fdd18edb09b7d80bceed2caa184976825d0be252ea1fc2212804244840f80f66c41c2412a66d39e6f99eb87cc040c4a9752d7e359f45ec65ab430785b7469a45b45fbc86e84d1630e0562f3c23c26ee96a99970c4e29612988a7ef3ef5e381f44955fa398f3cc51aa4f625d15c3722c3bd7ddc7c6384a2e974993eacc456fe91c767dcbf2f7547ab9a0743c42302a89dbfac29658eeddb8d32e4b318e87b1274ec64eb8ecfc889b7bb73bf6b3bae3264047285021c7ea96", 0xd9, 0x20}, {&(0x7f0000000700)="5cc4536a03038159f8c3383c502e0eb3a72b6622103b860c6d096f600f590ed238de267c97f31945a00b59aa3c12aaed1fb18832996c10ad626f782682ce2cc1bf6c60ce2be693cba12297e33db4ed", 0x4f, 0x6}], 0x92a88b, &(0x7f0000000880)={[{@journal_async_commit}, {@lazytime}, {@nomblk_io_submit}, {@nouser_xattr}, {@bh}, {@dioread_nolock}, {@nodelalloc}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@acl}, {@stripe={'stripe', 0x3d, 0x9}}], [{@permit_directio}]}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) copy_file_range(r2, &(0x7f0000000940)=0x6, r3, &(0x7f0000000980)=0x9, 0x1, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:31:28 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1004000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2176.552728] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2176.594068] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xfc}, 0x1c) [ 2176.656013] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:31:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x5000}, 0x1c) [ 2176.704692] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x1f4}, 0x1c) 23:31:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x5e00}, 0x1c) [ 2176.867038] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2176.873027] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x218}, 0x1c) 23:31:29 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2176.977809] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2176.978598] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2177.009779] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:31:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x80fe}, 0x1c) 23:31:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) io_submit(0x0, 0x0, &(0x7f0000000280)) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) openat(r4, &(0x7f0000001340)='./file0\x00', 0x40100, 0x0) 23:31:46 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x6}}, 0x1c) 23:31:46 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:46 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe000000}}, 0x1c) 23:31:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x240}, 0x1c) 23:31:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xc0fe}, 0x1c) [ 2194.266759] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2194.275468] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:31:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x300}, 0x1c) [ 2194.379055] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:31:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xe803}, 0x1c) [ 2194.403997] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2194.421446] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:46 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000380)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@uname={'uname', 0x3d, '{'}}], [{@obj_type={'obj_type', 0x3d, '{{^$'}}, {@uid_gt={'uid>', r5}}, {@euid_lt={'euid<', r5}}, {@hash}, {@permit_directio}, {@appraise}, {@appraise}, {@obj_type={'obj_type', 0x3d, '@&[&'}}]}}) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000380)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@uname={'uname', 0x3d, '{'}}], [{@obj_type={'obj_type', 0x3d, '{{^$'}}, {@uid_gt={'uid>', r7}}, {@euid_lt={'euid<', r7}}, {@hash}, {@permit_directio}, {@appraise}, {@appraise}, {@obj_type={'obj_type', 0x3d, '@&[&'}}]}}) r9 = getegid() keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000300)=@keyring) keyctl$chown(0x4, 0x0, 0xee01, r9) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x4, 0x3}, 0x6) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)={{}, {0x1, 0x1}, [{0x2, 0x3, 0xffffffffffffffff}, {0x2, 0x2, 0xffffffffffffffff}], {0x4, 0x6}, [{}, {0x8, 0x0, r9}, {0x8, 0x1}], {0x10, 0x2}, {0x20, 0x7}}, 0x4c, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {0x1, 0x6}, [{0x2, 0x1}, {0x2, 0x1, r3}], {0x4, 0x1}, [{0x8, 0x2, r6}, {0x8, 0x6, r9}, {0x8, 0x3, r8}, {0x8, 0x2, r10}, {0x8, 0x6, r6}, {0x8, 0x2, r6}], {}, {0x20, 0x3}}, 0x64, 0x3) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,obj_type={{^$,uid>', @ANYRESDEC=r11, @ANYBLOB="5bb1bc83740eedc662932d08ca645beb8f8af83055c39c55ba88f8de1444a96bfdf217f7e882af46d0231d492ea0dc83b5395ab6255ed3c28f7ab3ca22bb2e3d5dba95b8b598bec06bf5b7e787f043a10721f72007a3999d2ffe973b873419757a873424c9568adbca004a31ce3ada93fe1c6dbfc0eeada06b44347ddc6c743359b2087ac2e01e24febe07ebf5f72752fa78537dbabf8c8d90ecb1fe7ac643d3e60227133ce6c711f01819a866d0108f3133d3af25603a388a15a1b63e0c72b91395e3a51cd95b3f934cb41d9387f1ba1b65eb3e1ffbfbef82616963f548c691971978eaf46c05c1528031f9e5bc793b04450e246adac20f1660be8d84d15061d0ad9e6a6cd5d4558932d3dc2ce11599e90815ece8f4b801c3a4a083000000", @ANYRESDEC=r11, @ANYBLOB=',hash,permit_directio,smackfstransmute=smackfshat,appraise,obj_type=@&[&,\x00']) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="7472616e9db5126afcee733d66642c7266646e6f3d", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=user,access=user,dfltgid=', @ANYRESHEX=r4, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',pcr=00000000000000000007,fowner=', @ANYRESDEC=r5, @ANYBLOB=',euid<', @ANYRESDEC=r7, @ANYBLOB=',obj_type=rfdno,uid>', @ANYRESDEC, @ANYBLOB=',smackfsroot=net/ip_tables_targets\x00,fowner>', @ANYRESDEC=r11, @ANYBLOB=',\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:31:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x3e8}, 0x1c) 23:31:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xf401}, 0x1c) [ 2194.537953] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x280d000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2194.552200] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2194.552963] 9pnet: p9_fd_create_tcp (19736): problem connecting socket to 127.0.0.1 23:31:46 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xfc00}, 0x1c) [ 2194.572899] 9pnet: p9_fd_create_tcp (19736): problem connecting socket to 127.0.0.1 [ 2194.591943] 9pnet: p9_fd_create_tcp (19736): problem connecting socket to 127.0.0.1 23:31:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x500}, 0x1c) 23:31:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e00000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:31:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x7}}, 0x1c) [ 2195.104177] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2195.112006] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:31:47 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:31:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x18020000}}, 0x1c) 23:31:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xfe80}, 0x1c) 23:31:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x600}, 0x1c) 23:31:47 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2195.168827] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2195.188945] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2195.196126] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2195.210462] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:31:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x700}, 0x1c) 23:31:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xfec0}, 0x1c) [ 2195.278354] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:32:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x300, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 2214.557280] net_ratelimit: 1 callbacks suppressed [ 2214.557297] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:06 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:32:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xff00}, 0x1c) 23:32:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xe00}, 0x1c) 23:32:06 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:32:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x8}}, 0x1c) 23:32:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x40000000}}, 0x1c) [ 2214.582645] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2214.612783] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:32:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xff0f}, 0x1c) 23:32:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x1802}, 0x1c) [ 2214.673170] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:32:06 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2214.778519] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x9}}, 0x1c) 23:32:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x40020000}}, 0x1c) 23:32:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:32:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4000}, 0x1c) 23:32:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x1000000}, 0x1c) 23:32:22 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:32:22 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:32:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000180)='./file1\x00', 0xce, 0x7, &(0x7f0000001700)=[{&(0x7f0000000300)="9cc5bfe1ae528a85b4e38416e625e163141f3ca824413a232db2406235c8c79b4d412e8caf230a2152bb2e27ac471baf07b7e11d4e6ca0fea42b6098912464454d879dc8ba420017293ca66e22652fad70f20ce7bec02a15f264a939b9f21dc7528e2214fff5d5fe31321c1a350e529c3e6a7b4f69d81569753b5242b1cb60a4acf0261563dac56fad2a5d327a99d96c7574b98b96f4862fc605b5ae8afed41c7074f4298215a718f7e6bd3f9bb9d59c484cc5bf393d5d005a186e74d8268612", 0xc0, 0x5}, {&(0x7f00000003c0)="2824e0be4cbac51e3ffa1039cbd2194b0c035e4f5077aab8ac7c3d55bde52736ec6f4ce53b150e3325ad9d6c2c9683f5a6bebbf22de1ebafd400d12c6355dd2d07df30ad0e65c932e0424b0c9004cb9bb9269167395041db07c1e7e1cc23d70b5cdf5cf09d1ccb807d340b019981660a9212955d3549a3682252a155101be6a72832bda0db20c6492d9cd76267c80573ce5203d0c5d3bb644b1a2fb2fb945f2c6f4a6f4016aded4bcfd0cd51033223f39306", 0xb2, 0x3ff}, {&(0x7f0000000480)="253bdbf768f438f82704412b92a37893f24e299fc08d809e4376dae069eafba6a78d3bbc55c068501b5765c80b47d5830ad8cf9eef02578b32725d2e40c75663b1b0fd593958f0dd7ad7d7cd6e4cc5c875d09ec4bcb7ea7661ef45a082987bfe5648f03cf40e1b1abe0ddefc7c080e4cebf32852fd0bee32f186be9846049c312e2eeb96884b2ff18ecf5ac20148bd09e6194b4a962ff44a627dc052d251b211b78b5c6db1c857dba3d2363f3c6c005f3efddec8f9e0d0bfc0414d", 0xbb, 0xffff}, {&(0x7f0000000540)="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", 0x1000, 0xe51}, {&(0x7f0000001540)="a9f098a3985510f958187f19564e147792d0a7eb57a8908e27b334b9cadd492ca09fdca9e304a87b8ac3654b2a2ad8baed36115734c49207f9031d979ec926f78cef3c2504f9a59720041973053846ee3ac0488ca15fa1f0e0c9023b251006330f3c105c96dbd3d876d4dff28c8886c9cc4dc47e149c80c8823a2547c56654053b4966cad563cdca98425175b46714bc8b49e1471c459311c0cb41a5a7db6093dcc9f309fafc5ee586f7f919fdbb08d5ee6a009a827650852b73e3be8ef6bf8481c4f83fdc92d8d06062d02d4fb10c48c51e94218c0f0fb38edb72aa961db8", 0xdf, 0xff}, {&(0x7f0000001640)="4a0342a1e442056e858b2022dea971bcf9b7ea2027cfef20c4844570feab29401f971733d2dd779b996d5dd2f3734eab1e7f51daaa50fd3ab8db7bd80441cfbfc60aa2ebc019ef8b68d2b0e278b986dbec7924eb17789a9f559e81c78af8123defab17aa152f5bbfe209b537b85bb62e3597568c5a9d317e1372d01cf2613c0b1ef1da4f6d5c33c7838d9ea9c3666a3bc29d62549a3522afa754a7be1425c4eb4cefad153924dcafbaa50068da7823e7622e767e9ae4cd55c751a0cdb2d2", 0xbe}, {&(0x7f00000001c0)="f582591e70", 0x5, 0x4}], 0x3800808, &(0x7f0000000240)={[{@nodots}, {@fat=@codepage={'codepage', 0x3d, '437'}}, {@nodots}, {@dots}, {@dots}, {@fat=@debug}], [{@fowner_lt}]}) openat(r1, &(0x7f00000017c0)='./file1\x00', 0xa60500, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) [ 2230.723260] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2230.731883] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2230.762687] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x2000000}, 0x1c) [ 2230.800628] FAT-fs (loop4): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 2230.856896] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:32:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4002}, 0x1c) 23:32:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x3000000}, 0x1c) [ 2230.944806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:32:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x4000000}, 0x1c) 23:32:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r1, r1, 0x0, 0x3) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 23:32:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4800}, 0x1c) 23:32:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x5000000}, 0x1c) [ 2231.128914] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2231.267641] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2231.283420] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:40 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x6000000}, 0x1c) 23:32:40 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:32:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = accept$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @private}, 0xfffffffffffffffd) sendfile(r2, r3, 0x0, 0x9) r4 = syz_mount_image$nfs4(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x101, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000300)="22567a850fc00f42d6579a6efb619b9151dcc23bb5f30effed16132ea734f05c74811d5b53ec47fb362174b809c27ce09516d96dce46a2254eb209585f0dd8e00da01049d2a6e5729e081db52d8afced1b93e3377f3e39892aa8d584112ed62ac4f2ff40e59f78fc1711b4b67d77aaaac40d21ec2503a5b74451bd64bf3bb6bf49615ed8039100c2c7d796e7f449c4", 0x8f, 0x100000001}, {&(0x7f0000000240)="01d0c5114a0e", 0x6, 0x2}, {&(0x7f0000000280)="3c493b7b26c4a11d76d016bf6e48cc11a451c98c7e9d56af3e03ef7762ac5938087fd8bd4896ac683b52763a833e88f1365c", 0x32}], 0x1011, &(0x7f0000000440)={[{'-.\']+\xe0.-\x00'}], [{@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@audit}]}) getdents64(r4, &(0x7f0000000480)=""/191, 0xbf) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:32:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x50000000}}, 0x1c) 23:32:40 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x7fdc}}, 0x1c) 23:32:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5000}, 0x1c) 23:32:40 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2248.551785] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2248.568147] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2248.574553] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2248.618858] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:32:40 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x7000000}, 0x1c) 23:32:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5600}, 0x1c) [ 2248.681483] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2248.693349] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:32:40 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x8000000}, 0x1c) [ 2248.751965] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:32:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5e00}, 0x1c) [ 2248.823911] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2248.840698] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2248.848408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:41 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:32:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x80fe}, 0x1c) 23:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:32:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xe000000}, 0x1c) [ 2248.964317] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2248.967748] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x18020000}, 0x1c) [ 2248.977100] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:32:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2249.010398] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:32:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') openat(r0, &(0x7f00000000c0)='./file1\x00', 0x800, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 23:32:56 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 23:32:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x21eda646}, 0x1c) 23:32:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xb8ff}, 0x1c) 23:32:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:32:56 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:32:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x5e000000}}, 0x1c) 23:32:56 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2264.343695] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2264.344140] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2264.372629] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2264.377365] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2264.409614] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:33:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:33:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x40000000}, 0x1c) [ 2279.669830] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x79ff269c}}, 0x1c) 23:33:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x2}, 0x1c) 23:33:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, 0x0, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:33:11 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:33:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xc0fe}, 0x1c) [ 2279.676558] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = pidfd_getfd(r0, 0xffffffffffffffff, 0x0) copy_file_range(r0, &(0x7f0000000440)=0xffffffff, r3, 0x0, 0x3f, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x200, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000380)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@uname={'uname', 0x3d, '{'}}], [{@obj_type={'obj_type', 0x3d, '{{^$'}}, {@uid_gt={'uid>', r4}}, {@euid_lt={'euid<', r4}}, {@hash}, {@permit_directio}, {@appraise}, {@appraise}, {@obj_type={'obj_type', 0x3d, '@&[&'}}]}}) r5 = fork() r6 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r5, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYRESHEX, @ANYRES32=r5, @ANYBLOB="00005678a0389ab9bdfbe33c4927d945cfe7a08388119856a9b877a677e007e413efd141910775574e7d84d005074503bf13ad7e940f9da945d846429ff606be3d45f6cf2688d39f357d4c0035e858acfcdc9b406fb0978a33f1fdcfd0be0b5f05edf09abcc8bb103fdbc2736fa78257023e997132c5093168a58216a712a4e186fe7af810cc892f5a1e42824145948a432c3cc835726fa4e5f0bb45f3dd725f8641e22d3047b79cb9f7872bf1fcd7abecc4aecc2561c43d02efa9add5e1e49dd4ee62feeb911036cb1eb95d793ee86b3965324a397a94663e7493cc160ca422b45c56b00ba549b382640a08f30c0042008100"/262], 0x324}, 0x1, 0x0, 0x0, 0x4c800}, 0x8050) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000055840)={{0x0, 0x2, 0x4, 0x40, 0xfffffffffffffffa, 0x6, 0x1ff, 0x10001, 0xfff, 0x207c87bb, 0x9, 0x1, 0x400, 0x400000000000008, 0xfe}, 0x10, [0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000558c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000055ac0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000055cc0)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xf6, "a05e72ae4c773b"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000056cc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056ec0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7, r8}, {0x0, r9}, {0x0, r10}, {}, {0x0, r11}], 0x0, "c4a85dfd44c352"}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x4964}}, './file1\x00'}) io_uring_enter(r12, 0x3201, 0x5b93, 0x3, &(0x7f0000000180), 0x8) [ 2279.690333] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2279.702962] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2279.707912] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:33:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x40020000}, 0x1c) 23:33:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xe803}, 0x1c) [ 2279.737874] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:33:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x3}, 0x1c) [ 2279.782959] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:33:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x46a6ed21}, 0x1c) 23:33:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xf401}, 0x1c) [ 2279.838867] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2279.848785] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2279.876311] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 2279.891052] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2279.892744] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2280.007632] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xfc00}, 0x1c) [ 2297.143038] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2297.149491] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2297.173344] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/15, @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) r2 = creat(&(0x7f00000000c0)='./file1\x00', 0xb4) openat(r2, &(0x7f0000000180)='./file1\x00', 0x400400, 0x8) 23:33:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) 23:33:29 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:33:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x836886ff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:33:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x91ffffff}}, 0x1c) 23:33:29 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, 0x0, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:33:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x50000000}, 0x1c) 23:33:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x5e000000}, 0x1c) 23:33:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5}, 0x1c) [ 2297.227485] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:33:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x6535d082}, 0x1c) 23:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xfe80}, 0x1c) [ 2297.277212] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2297.293489] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2297.299890] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2297.299911] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2297.305738] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:29 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, 0x0, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:33:29 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x82d03565}, 0x1c) 23:33:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) [ 2297.450604] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2297.457964] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xfec0}, 0x1c) 23:33:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x9a0937c2}}, 0x1c) 23:33:45 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x91ffffff}, 0x1c) 23:33:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') r2 = clone3(&(0x7f0000000300)={0x1510000, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0xcc, 0x0, 0x0}, 0x58) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/class/vc', 0xc1140, 0x0) sendfile(r3, r3, 0x0, 0x3) openat(r3, &(0x7f00000000c0)='./file1\x00', 0xa50000, 0x80) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',Wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) mkdir(&(0x7f0000000240)='./file1\x00', 0x21) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)={0x0, 0x0}) r5 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r5, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000004c0)=0x0) r7 = fcntl$getown(r3, 0x9) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) clone3(&(0x7f0000000540)={0x240008000, &(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000380), {0x1a}, &(0x7f00000003c0)=""/99, 0x63, &(0x7f0000000440)=""/42, &(0x7f0000000500)=[r4, r2, r5, r6, r7], 0x5, {r8}}, 0x58) r9 = openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.throttle.io_serviced\x00', 0x0, 0x0) ioctl$EXT4_IOC_GETSTATE(r9, 0x40046629, &(0x7f00000001c0)) 23:33:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:33:45 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x7}, 0x1c) [ 2313.732545] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2313.732832] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:33:45 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, 0x0, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2313.763083] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2313.769581] 9pnet: Insufficient options for proto=fd [ 2313.772261] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2313.796764] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:33:46 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x8}, 0x1c) 23:33:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xe8030000}, 0x1c) 23:33:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xff00}, 0x1c) [ 2313.923261] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2313.955929] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:46 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xf4010000}, 0x1c) [ 2313.986468] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:33:46 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:33:46 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xe}, 0x1c) [ 2314.072129] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:33:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xff0f}, 0x1c) [ 2314.097893] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2314.105479] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2314.114977] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2314.144950] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xf5ffffff}, 0x1c) 23:34:03 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:34:03 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, 0x0, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:34:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:34:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000180)={0x2901d0100, 0x0, 0x0, 0x0, {0x12}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:34:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x48}, 0x1c) 23:34:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xffb8}, 0x1c) 23:34:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x9c26ff79}}, 0x1c) [ 2331.026232] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x50}, 0x1c) [ 2331.065981] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2331.066407] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2331.077178] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2331.094800] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2331.111946] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xfc000000}, 0x1c) 23:34:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x20000}, 0x1c) 23:34:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:34:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x56}, 0x1c) 23:34:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xfe800000}, 0x1c) [ 2331.294599] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2331.297580] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2331.305967] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xfec00000}, 0x1c) [ 2331.330105] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2331.348619] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:34:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xff000000}, 0x1c) 23:34:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xc237099a}}, 0x1c) 23:34:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5e}, 0x1c) 23:34:21 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, 0x0, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:34:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x1000000}, 0x1c) 23:34:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:34:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xff0f0000}, 0x1c) 23:34:21 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:34:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = socket$unix(0x1, 0x2, 0x0) ioctl$FIONCLEX(r1, 0x5450) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/softnet_stat\x00') r3 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r4, r4, 0x0, 0x3) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000240)={0x4f65, 0xfffffff9, 0x6, 0x8}) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/103, 0x67}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/255, 0xff}], 0x3, 0x5, 0x0) r5 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r5, 0x0, 0xffffffffffffffff, 0x0) r6 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r6, 0x0, 0xffffffffffffffff, 0x0) r7 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r7, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) clone3(&(0x7f0000000700)={0x100380200, &(0x7f0000000080), &(0x7f0000000500), &(0x7f0000000540), {0x3b}, &(0x7f0000000580)=""/107, 0x6b, &(0x7f0000000600)=""/188, &(0x7f00000006c0)=[r3, r3, 0x0, r5, r3, r6, r7, 0xffffffffffffffff], 0x8, {r8}}, 0x58) [ 2349.021052] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2349.030190] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xffffff91}, 0x1c) [ 2349.051140] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2349.057273] Zero length message leads to an empty skb [ 2349.078253] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:34:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') r2 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) syz_open_procfs(r2, &(0x7f00000000c0)='mountstats\x00') [ 2349.174839] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xfc}, 0x1c) 23:34:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0xfffffff5}, 0x1c) 23:34:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x2000000}, 0x1c) [ 2349.265707] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2349.276134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x17) 23:34:38 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x3000000}, 0x1c) 23:34:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:34:38 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:34:38 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x1f4}, 0x1c) 23:34:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x2000001c) 23:34:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x19955cd769240c7a, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:34:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xe8030000}}, 0x1c) [ 2365.915285] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2365.933580] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2365.962738] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2365.971045] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2365.989841] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x200000, @loopback}, 0x1c) [ 2366.063459] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:34:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x25, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:34:38 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x218}, 0x1c) 23:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4000000}, 0x1c) 23:34:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:34:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fsetxattr$security_capability(r0, &(0x7f0000000180), &(0x7f00000001c0)=@v3={0x3000000, [{0xa63, 0x800}, {0x0, 0x1f}], 0xee01}, 0x18, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d66642c726664806f3d", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) [ 2366.225000] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2366.230953] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2366.238628] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2366.250683] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 2366.297648] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2366.302296] 9pnet: Insufficient options for proto=fd [ 2366.362044] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:34:38 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5000000}, 0x1c) 23:34:38 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x240}, 0x1c) [ 2366.453319] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2366.455158] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2366.469556] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2380.739684] net_ratelimit: 1 callbacks suppressed [ 2380.739707] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2380.739803] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2380.747865] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2380.753432] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:34:52 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:34:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xf4010000}}, 0x1c) 23:34:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r2, r2, 0x0, 0x3) pread64(r2, &(0x7f00000000c0)=""/26, 0x1a, 0x1000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:34:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:34:52 executing program 7: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000040)={0x4, {{0xa, 0x4e21, 0x3, @mcast2, 0x7}}, 0x0, 0x1, [{{0xa, 0x4e22, 0x3a4, @empty, 0x80000000}}]}, 0x110) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, &(0x7f00000002c0)=0x1, 0x4) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000180)={0x1, {{0xa, 0x4e24, 0x8, @mcast1, 0x7fff}}, {{0xa, 0x4e20, 0x6, @local, 0x3}}}, 0x108) 23:34:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x300}, 0x1c) 23:34:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x6000000}, 0x1c) 23:34:52 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2380.765918] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2380.781914] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:34:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x7000000}, 0x1c) 23:34:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) 23:34:53 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x3e8}, 0x1c) 23:34:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2380.849012] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2380.854128] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2380.859414] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2380.873609] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2380.879533] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:34:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x8000000}, 0x1c) 23:34:53 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r1, r1, 0x0, 0x3) sendfile(r0, r1, &(0x7f0000000040), 0x4) [ 2380.965544] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:08 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfff7ffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2396.464205] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x500}, 0x1c) 23:35:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="e2da1223ece629ea7a8c86084c30a495", 0x10) r1 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000080)=0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x564, 0x0, 0x2, 0x8, 0x1, 0xb5f0}, 0x20) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:35:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xe000000}, 0x1c) 23:35:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xf5ffffff}}, 0x1c) 23:35:08 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB, @ANYRESHEX=r0, @ANYBLOB="2c038cc6b88c7b2437d675ca8ba8d9bd576231b2f451a479b0711cfe"]) r2 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r4, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000480)={0x193018c00, &(0x7f00000000c0), &(0x7f0000000240), &(0x7f0000000280), {0x25}, &(0x7f00000002c0)=""/126, 0x7e, &(0x7f0000000340)=""/208, &(0x7f0000000440)=[r2, r3, r4], 0x3}, 0x58) [ 2396.489558] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2396.492272] 9pnet: Insufficient options for proto=fd [ 2396.504022] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2396.507157] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2396.514558] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2396.528531] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:35:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x600}, 0x1c) 23:35:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:35:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x16e59541}, 0x1c) 23:35:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2396.635582] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2396.650051] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2396.665585] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2396.689608] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:35:08 executing program 7: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="eb660000", @ANYRES16=r0, @ANYBLOB="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"], 0x148}, 0x1, 0x0, 0x0, 0x24040010}, 0x4000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:35:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x700}, 0x1c) 23:35:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x282000, 0x0) writev(r1, 0xfffffffffffffffd, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') r3 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="310dc2b8b0c4dfd694938756068f5595a858a1eb32351267a28b7f6de21bdf09643157e54d69ce3bc96e195a1a45044279eb0df0ee8d23b38c22e0367a5ee5b1903cd898a3066b8785b0b1de71e9a1822e2312b97a37edabf1aa6e3e3a7e62d05a619dc7ca4b325dca39c682344ceee615dfe189c8d758c36dd331d17b7a991ee755653cf7a9db29db8c26e6ca7fe7f03bd4d6e56a0e1227e9c95561258c2392e911c409060a28e16fca422a37401dd927d4c148e70a306d6986dc7431ade6c19bec0b73a5715878e8d7d0a8b39226"]) fcntl$lock(r2, 0x25, &(0x7f00000000c0)={0x0, 0x3, 0xfd82, 0x3, r3}) 23:35:08 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x18020000}, 0x1c) 23:35:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2396.778991] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2396.791800] 9pnet: Insufficient options for proto=fd [ 2396.794346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:09 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2396.809404] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xe00}, 0x1c) 23:35:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfc000000}}, 0x1c) 23:35:26 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:26 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x29dc5490}, 0x1c) 23:35:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:35:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') r3 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYRES32=r0, @ANYRESHEX=r1, @ANYBLOB=',\x00']) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) r6 = syz_open_procfs$userns(r3, &(0x7f0000000240)) sendfile(r4, r6, 0x0, 0x3) open$dir(&(0x7f0000000280)='./file0\x00', 0x440, 0x50) ioctl$AUTOFS_IOC_ASKUMOUNT(r5, 0x80049370, &(0x7f0000000180)) 23:35:26 executing program 7: ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'tunl0\x00'}) [ 2413.870777] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2413.877776] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2413.904054] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2413.915170] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2413.916650] 9pnet: Insufficient options for proto=fd 23:35:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x1802}, 0x1c) 23:35:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x40000000}, 0x1c) [ 2413.972885] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2414.034484] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2414.042624] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2414.056970] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2414.070854] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2414.097916] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:26 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x40020000}, 0x1c) 23:35:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:35:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4000}, 0x1c) [ 2414.210461] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2414.213547] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2414.232778] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2414.284009] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:35:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfe800000}}, 0x1c) 23:35:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) 23:35:42 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4002}, 0x1c) 23:35:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000002800)=0x1, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = eventfd(0x0) pwritev2(r2, &(0x7f0000002740)=[{&(0x7f0000001700)="03c75e2672965b22c8df2dd47761108436cf67f0d784c46e4eade8c9279234fdb1102b5c72d6c2b4a3cf9304335a8fa06f147ae47017", 0x36}, {&(0x7f0000001740)="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", 0x1000}], 0x2, 0x81, 0x0, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r4, r4, 0x0, 0x3) r5 = syz_mount_image$ext4(&(0x7f0000000380)='ext2\x00', &(0x7f00000003c0)='./file1\x00', 0x401, 0x5, &(0x7f0000001600)=[{&(0x7f0000000400)="4479591fbc7ad9f3d864cff432697ed7b2e8783aa9cf969ead7aa918ca174dc7ef0b04ab0d9dde39c18a8ba0c23554dc19f7edad9c88be5b871d592890ab83691cbd6f4221619615505536a8e99102c09ba033", 0x53, 0x2}, {&(0x7f0000000480)="c4bef9c46e89beb5ab62f1acd98af26eb1a7ab958ac836260bfca1ecb2f2ecc61c5dccede22a71ca1d2398b8e4ed77653385db657da3d3b6f16fc6112161a914bb964cf55fae6ad43c8bbe60034ea78315fa7944bcf69bca11f2dca8394b738b23430f6f8397", 0x66, 0xffffffffffffff81}, {&(0x7f0000000500)="b8a646efdbb12fac855f1f176f25450e297a2e2bd65b6dc9d3af39f389ea4f08f0fe1e5b992746cc87bb4b050afe25054bd5ad746035fb908febf78aab61d66c58d3127726f29c064d4e803a3a77899a4a07672220342298d9aabcafaf78d161c5edd0e843381f116d56e2330f6e4cc5e31db422bcd965deea255837", 0x7c, 0x5}, {&(0x7f0000000580)="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", 0x1000, 0x6}, {&(0x7f0000001580)="652ece750796c91b2eb15e9ac9a1cf279f04b8d8a19acd69dd52a4b79e7b981236c90a6da26cb76aee48b2bad582c1a5511d18cb47caab326fa877a8366ad4537bbf3c3678ff0bff", 0x48, 0x100000000}], 0x200000, &(0x7f0000001680)={[{@dioread_nolock}], [{@smackfstransmute={'smackfstransmute', 0x3d, ']$.:{,'}}]}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) r7 = socket$unix(0x1, 0x0, 0x0) openat(r5, &(0x7f00000027c0)='./file1\x00', 0x101000, 0x1) ioctl$sock_ifreq(r7, 0x891b, &(0x7f00000016c0)={'veth1_to_team\x00', @ifru_map}) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r4, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00Z:', @ANYRES16=r6, @ANYBLOB="020229bd7000fcdbdf25770000000c00990002000000010000000800ef00020000000500ee00080000000500ee0003000000"], 0x38}, 0x1, 0x0, 0x0, 0x4060025}, 0x24048051) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd8rfdno=', @ANYRESHEX=r3, @ANYBLOB=',w[dno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r8, r8, 0x0, 0x3) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r8, 0xc038943b, &(0x7f0000000180)={0x30, 0x18, '\x00', 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0]}) open_by_handle_at(r4, &(0x7f0000002880)=ANY=[@ANYBLOB="240000000500000058310800d00f0000a90000f120340000080000000ee64ac9ad8c10297224b796e2eab65ab45fa95913795c82cdff8155815cf155f0086927b1e3e5aad724cc083429eb082168156dc8bfc8f66f2cd8e2532ecf94106df9d8977a2b5c8999b2aa6b8dbc1972983ddbc831dd1bf08f265e91ccce89368a0027bbc1214166441dabb22c07f55196574e5024445438fbb4265c6bac0f872eef3be25c8b04215072f5fab7a1e91531a4bb42ed6421c9ee797d77485ce0a2ac3823b34a2d3f1dc925f28cfaa4a5090b54dc8b15f989deae38ea12d029cd9c56c85b2dec9f88"], 0xfca8237846d4357) 23:35:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4195e516}, 0x1c) 23:35:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:35:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x91ffffff00000000}}, 0x1c) [ 2429.844120] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2429.846946] net_ratelimit: 2 callbacks suppressed [ 2429.846960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2429.867017] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2429.884690] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2429.888061] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2429.904341] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:35:42 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x600081, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0x2000003) r2 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0)={0x0, 0x39d1, 0x10, 0x2, 0x3}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000280)=0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r5}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20d315) inotify_rm_watch(0xffffffffffffffff, r1) r6 = syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x4, 0x4, &(0x7f00000014c0)=[{&(0x7f0000000340)="13d9d9a6c2f13b570cdfd5a5eef3e2fd6463537c3b6981a11f309f5aae259320c5f93763e255993104663e3d01fd48cc69f1885e47fab9a329f588567dcd373d88e6b08bc150e7b54754b3a0ed2ec04b45dc804d78ea1d7a5cabc08aa7023e9959bfeb118f352e6a85acc375f7b3da25b34cdd3e6328cf7339a987ca4765dcc305f0444cc6621f23fc26600b07c3281cd2a474c2b7d4f2dc01a45409e9cf065e97db7abdd1386bd09b7b997d5d275d5a99f1a746f3a903e2a2d73b9a6a10fb174d097613a2f4124636ea645ac343c99d7412d49e0b", 0xd5}, {&(0x7f0000000440)="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", 0x1000, 0x100000001}, {&(0x7f0000000180)="0ebd21f5458f60d3410f5ac2b3ede9e6c472a5c70ad382c9a61af50df041aabc320b96f8d17f92ed48f208", 0x2b, 0x8043}, {&(0x7f0000001440)="42354435c529533d589ff03ad2c9b4747069fea737e9a8996344a08c4a8639c99cda524474a5f2c298917e4b24c3042d4a43755b145d0c2f3dbd3d4b4a7a2b18eb42eff23630eac8286c77f4f0da2c0280527dbd9e145e8268c5548097322f5afd0ebef87504221a6b1a407cc8b63551c994090facd139eb48", 0x79, 0xf00c}], 0x104800, &(0x7f0000001780)=ANY=[@ANYBLOB='norock,check=relaxed,nocompress,block=0x0000000000000400,cruft,nocompress,fsuuid=do8469c9-1jfa-be92-57aa-5ed95\x00f4,context=root,dont_appraise,smackfshat=/dev/sr0\x00,euid>', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',appraise_type=imasig,smackfsdef=/dev/full\x00,\x00']) ioctl$BTRFS_IOC_BALANCE_CTL(r6, 0x40049421, 0x1) close(r5) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(r7, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8001) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index=0xa, 0x8000, 0x0, 0x2, 0x3}, 0x8) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:35:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x48000000}, 0x1c) [ 2429.959564] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 23:35:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x4800}, 0x1c) [ 2430.007897] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2430.031971] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2430.067499] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2430.075558] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x50000000}, 0x1c) [ 2430.137292] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:42 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x56000000}, 0x1c) [ 2430.279609] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2430.295928] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2430.359566] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:35:58 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5000}, 0x1c) 23:35:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:35:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xfec00000}}, 0x1c) 23:35:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {r1}}, './file1\x00'}) r3 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x40080, 0x0, 0x0, 0x0, 0x10}, r3, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(r3, &(0x7f0000000bc0)='io\x00') openat$cgroup_type(r2, &(0x7f0000000b80), 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r4, r4, 0x0, 0x3) preadv(r4, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/21, 0x15}, {&(0x7f0000000180)=""/124, 0x7c}, {&(0x7f0000000300)=""/229, 0xe5}], 0x3, 0x81, 0x101) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r5, r5, 0x0, 0x3) write$binfmt_elf32(r5, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x11, 0x0, 0xff, 0x1, 0x2, 0x3e, 0xa73, 0x27b, 0x38, 0x1ec, 0x8, 0x0, 0x20, 0x1, 0x7ff, 0x1000, 0xfff7}, [{0x6, 0x1, 0x1, 0x8, 0x5, 0xaab, 0x0, 0x1807}], "ce75410eb5ee", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x75e) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file1\x00', 0x80000, 0x42) 23:35:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x58748369}, 0x1c) 23:35:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r3 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2445.914103] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2445.931901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:58 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) sendmmsg$inet6(r0, &(0x7f0000002e80)=[{{&(0x7f0000000100)={0xa, 0x4e22, 0x4, @local, 0xaf}, 0x1c, &(0x7f00000012c0)=[{&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="76162ce5d94a2eed842fa49f9355ac033a5f59e79d64c69eb428fe7fe9f53a2cbfcafb8e2174db04570a9e5461ddd40d928f06", 0x33}, {&(0x7f0000001180)="c85350687063ae4fdbbbdc1386f5dffc458bc98dd47ef340fdf265404c2c7c2c367d7fbb365088295a304be23c3f195392c9b1d87a3cf8ac463d5f5e7615f5670126834a8b230f59479cfac6cfeefbc2302efd3e401c010142b087ec45a56f7dc5cd43b758faee122c1eaf3ae0a7be012294826a8f09828c16f01abf5c3f02fff503b6dc7027a1b06dbbb95d4a105691f333ee97af16a2d3", 0x98}, {&(0x7f0000001240)="93a8b19cc5d769af75c537b33a64ad290146b546ceb553e6c05a240de73e88b8b297d6d923f5dafb33b9c165350bbd6a7633fc1d127c742f00b94aa171958935a5239e7c719f7806e8c5d108be6ac4ae0be19d433170931e57dfe0a0852411b068fa0865", 0x64}], 0x4, &(0x7f0000001300)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001340)="c62b3a", 0x3}], 0x1, &(0x7f00000013c0)=[@rthdrdstopts={{0x170, 0x29, 0x37, {0x2c, 0x2a, '\x00', [@ra={0x5, 0x2, 0xe3d8}, @generic={0x3f, 0x93, "75924920aa496889eb52d4106039880e269db5c9eabb0890012a888a59ffe3042f0e48359bc8c1be3c2ab9919e17248cebffa57190aeb118ccbb84422a9d3f0eb9d15120530c1c44bde68185de44b3aa99a3b2615794c98573ead351c1d04a43beff36e7af53b61da6b333f4b46de07255c008d958fcdc89221de7bb970a884a55bc123da7f78650d8ee6b82f601544a02f853"}, @generic={0x4, 0x9e, "e84d871bee534e1b09f7b9d8542796212e3632153913a1df18103bf790a470a400872be9c1750eddd519e3390e58cff3ce191288ddc1c5e27138baa429e2196b3d5b52a41efb95302af763b1758e24e65b040816d0bb09e6375c46b91c5e12d8dadfefbf61c7709e2d4ca6bf9aadb73400b54707df3a7a13f60fbf5e726609d4480e3d2003839d471291ce42c6a6e563085d97ec8ee942a8a71088eb3132"}, @pad1, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x5}, @pad1, @ra={0x5, 0x2, 0x1}, @ra={0x5, 0x2, 0x7}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x81}}, @hopopts_2292={{0x38, 0x29, 0x36, {0x3c, 0x3, '\x00', [@jumbo={0xc2, 0x4, 0x4}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}}}], 0x1c0}}, {{&(0x7f0000001580)={0xa, 0x4e24, 0x2, @local, 0xf3}, 0x1c, &(0x7f0000002700)=[{&(0x7f00000015c0)="1da6241e2a6c1ef6cdf0c43ad70aebafde4ac70198a1a53c35f2c1f976ed6a291579e42bfe3da2da4b93511bfefb70b4c44f38d19cf2ec728424", 0x3a}, {&(0x7f0000001600)="442a8e40ba12782ab8907c6a", 0xc}, {&(0x7f0000001640)="ac8393aed48f822d32c73b8924770bb1268ba065840726527be40a57b6d26f541fd25fe52f50891c67c2728d04b826f8b3d076bad5a9b44a706825648565ec0fcdc4ada75f7ec0f26b7af613c0d7bd4467a2ddb65246a95a6d1fed89fe8c02ad25e0d5e49f510f8cb4d9090f92b06ee305a219c00f894ba6c2e0e805ef8e9f8436560771dc31a004c9011623531e8456a7d1065cb3a5685571153d384d8ea07ce100", 0xa2}, {&(0x7f0000001700)="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", 0x1000}], 0x4}}, {{&(0x7f0000002740)={0xa, 0x4e22, 0x4, @loopback, 0x5}, 0x1c, &(0x7f00000028c0)=[{&(0x7f0000002780)="52bdf7055551cbdfe9f3c05768b58d64bdb82ca30276a1e25cc261", 0x1b}, {&(0x7f00000027c0)="c68870387923e2e11d551362d6f3d054c3a55aea01b1ce93e1e84da40976e05f5277c9de64dd004687d0ec63a674b966f8b75f90b969aa45ded949515da6", 0x3e}, {&(0x7f0000002800)="e2b0c69e4a35de01b96bbec595a0f33c6bc206d326db2a4ca4895d14855b6036d986d0f29e650331d5ceb53dffde3a23233da8e013fb22dad0571bc65024c9fe3c27595d3fb819f81bc4850939a07bce52f245703022e33f5c53ad6da743231d3dd7cdee8529d5bab68488bfc3bc85bf75f061aa7b443961de845d969d3754087a4d0b4ed3d8e6aa15aba9", 0x8b}], 0x3, &(0x7f0000003000)=[@tclass={{0x14, 0x29, 0x43, 0x5}}, @rthdrdstopts={{0x18, 0x29, 0x37, {0x3b}}}, @pktinfo={{0x24, 0x29, 0x32, {@private1={0xfc, 0x1, '\x00', 0x1}}}}], 0x58}}, {{&(0x7f0000002940)={0xa, 0x4e23, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0x6}, 0x1c, &(0x7f0000002bc0)=[{&(0x7f0000002980)="847a6667154ddda01d964d4aa47d036e3122f3461731e93168ec0e5aecc4279794c814f5061cf1c6960e4f399bdeb12e25d37baa569ee599c206a8c937d0e4b26788a362c49e793c440235e966515a65480755b89330404a0144b3e2f4aac407f5aadd0d7a5baf57167bed23fa73f466cee2e6ebf0213851830bd99e5b4478941ab679f809ea2063e99792c488049f7fda078d148492ff0ca708ad00da5d1fa9479449d9a95c68d90082b32f7bb62ce329163182f858bf9dcecfc5a79fee13c1e720e63b5e697fe1", 0xc8}, {&(0x7f0000002a80)="98b3f6a9953ee0bafe77b936cdee91b1896e3d14872ae5c1068178e5f6d160ad94bf72e834c3f13dc7f1d720f3aaf818d155ab2a068ab11215c880adaea34fd27043cd7385ba525f3e952f7687b6444e613b31677de37c06342a1d794dfb", 0x5e}, {&(0x7f0000002b00)="c1c39fdca06e611e689ac3856d98c226da06d335b592f1c94d826d080627f2c34ef5a887d1966bbfb482967e9295ce14d35a12b1cefd94b9754c5ce34c77e5963fb60b20fc3370657eb3d5d239f89842375c49e83622a68b46db22e91f16edc1ecff4eef747a09f1c2e74ffd64301f62b0ebab143940004574144c68b6ece786492bbbc65795202b896ffbb20ede846d9a397cc2841d", 0x96}], 0x3, &(0x7f0000002c00)=[@dontfrag={{0x14, 0x29, 0x3e, 0x5}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x29de}}], 0x30}}, {{&(0x7f0000002c40)={0xa, 0x4e23, 0xffff, @empty, 0x7}, 0x1c, &(0x7f0000002e40)=[{&(0x7f0000002c80)="0465abf3e3fd2ddad524afeb59c959447b21d43ec090b9374851168d3774240318d14aadce4fec966e32d8780989f5cb8c37414012d52ff6daf2cbefa52ce598c704b537848181366c4d25e2f22a426a83a1299fd18f1e5a91ff404e257b2cf5178750118c123abd5ef6ba9a71dbb75bbd2c0238fd800c9223b314dfe07292d6c844d4c244abea5e7d", 0x89}, {&(0x7f0000002d40)="d1d15a674ea0e8102977826f796be189313321e98b6fbcb2ccfd292b75e4f0c8e02591d0b2b57718dcce903b2393ff991985b40b50f31b8ef89375b45f4dad6acfdb300d33b07034a39a8738c7112dfb027ee08f9f4aa46a0843", 0x5a}, {&(0x7f0000002dc0)="aff1519777aea9911d50964160aae19245b4d9a8f83807e80eb0018e896f3a2c4152761146dfff324cfaf5cc8d5a96b4d5a7621bd47f8528a53706c1b9e878d41720db34d76338c500f230e92db86c", 0x4f}], 0x3}}], 0x6, 0x240440c1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/82, &(0x7f00000000c0)=0x52) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:35:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5600}, 0x1c) [ 2445.972462] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:35:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5e000000}, 0x1c) [ 2446.029583] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2446.049448] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c) [ 2446.085727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:35:58 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x2c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x3, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x2c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:35:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x5e00}, 0x1c) 23:35:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 2446.223683] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2446.232373] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2446.254119] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2446.281456] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) 23:35:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x69837458}, 0x1c) 23:35:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x5}}, './file1\x00'}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x98, 0x0, 0x8, 0x201, 0x0, 0x0, {0xa, 0x0, 0x6}, [@CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x81}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x40}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x884c}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7fff}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1000}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8809}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8864}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x98}, 0x1, 0x0, 0x0, 0x200408c7}, 0x4002800) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) fspick(r1, &(0x7f00000000c0)='./file1\x00', 0x1) [ 2446.292199] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:35:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x1c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:36:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff000000}}, 0x1c) 23:36:16 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x1c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:36:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x9054dc29}, 0x1c) 23:36:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r1, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {r1, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r2, r3+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:36:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:36:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendfile(r1, r0, &(0x7f00000000c0)=0x7f, 0x20) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) io_submit(0x0, 0x0, &(0x7f00000000c0)) 23:36:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0xfffffffd, @local, 0x7fff}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:36:16 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x80fe}, 0x1c) [ 2463.830877] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2463.853447] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2463.879173] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2463.894046] EXT4-fs (loop5): fragment/cluster size (32768) != block size (2048) [ 2463.924151] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:36:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r1, 0x80}, {r0, 0x200}, {0xffffffffffffffff, 0x4409}, {r1, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r2, r3+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:36:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x91ffffff}, 0x1c) 23:36:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:36:16 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xb8ff}, 0x1c) 23:36:16 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) close(r0) sendfile(r0, r0, 0x0, 0x3) r1 = syz_open_dev$vcsn(&(0x7f0000001440), 0x4, 0x101200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000001480)={@private0, 0x2, 0x0, 0x0, 0x0, 0xffff}, 0x20) syz_io_uring_setup(0x2c2d, &(0x7f0000000040)={0x0, 0xe242, 0x10, 0x1, 0x30c, 0x0, r1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000180)=""/129) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x2000, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x40}}, 0x2}, 0x1c) [ 2464.073045] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2464.089381] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2464.092554] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:36:16 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x1c, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) [ 2479.701838] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:36:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xb8ff0000}, 0x1c) 23:36:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x24, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}]]}, 0x24}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:36:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff0f0000}}, 0x1c) 23:36:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmmsg$unix(r0, &(0x7f0000004440)=[{{&(0x7f0000000180), 0x6e, &(0x7f0000001700)=[{&(0x7f00000002c0)=""/141, 0x8d}, {&(0x7f0000000380)=""/168, 0xa8}, {&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/161, 0xa1}, {&(0x7f00000015c0)=""/202, 0xca}, {&(0x7f00000000c0)=""/17, 0x11}, {&(0x7f00000016c0)=""/22, 0x16}], 0x8, &(0x7f0000001780)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x108}}, {{&(0x7f00000018c0)=@abs, 0x6e, &(0x7f0000001dc0)=[{&(0x7f0000001940)=""/249, 0xf9}, {&(0x7f0000001a40)=""/164, 0xa4}, {&(0x7f0000001b00)}, {&(0x7f0000001b40)=""/190, 0xbe}, {&(0x7f0000001c00)=""/175, 0xaf}, {&(0x7f0000001cc0)=""/204, 0xcc}], 0x6, &(0x7f0000001e40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}}, {{&(0x7f0000001ec0)=@abs, 0x6e, &(0x7f0000001f40), 0x0, &(0x7f0000001f80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}}, {{&(0x7f0000002040)=@abs, 0x6e, &(0x7f0000002540)=[{&(0x7f00000020c0)=""/112, 0x70}, {&(0x7f0000002140)=""/211, 0xd3}, {&(0x7f0000002240)=""/209, 0xd1}, {&(0x7f0000002340)=""/244, 0xf4}, {&(0x7f0000002440)=""/223, 0xdf}], 0x5, &(0x7f00000025c0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000002600), 0x6e, &(0x7f0000002ac0)=[{&(0x7f0000002680)=""/144, 0x90}, {&(0x7f0000002740)=""/234, 0xea}, {&(0x7f0000002840)=""/114, 0x72}, {&(0x7f00000028c0)=""/239, 0xef}, {&(0x7f00000029c0)=""/39, 0x27}, {&(0x7f0000002a00)=""/160, 0xa0}], 0x6}}, {{&(0x7f0000002b40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002bc0)=""/111, 0x6f}, {&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/36, 0x24}, {&(0x7f0000003c80)=""/122, 0x7a}, {&(0x7f0000003d00)=""/86, 0x56}, {&(0x7f0000003d80)=""/178, 0xb2}], 0x6, &(0x7f0000003ec0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000003f80)=@abs, 0x6e, &(0x7f0000004300)=[{&(0x7f0000004000)=""/44, 0x2c}, {&(0x7f0000004040)=""/18, 0x12}, {&(0x7f0000004080)=""/86, 0x56}, {&(0x7f0000004100)=""/250, 0xfa}, {&(0x7f0000004200)=""/217, 0xd9}], 0x5, &(0x7f0000004380)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}], 0x7, 0x20, &(0x7f0000004600)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0xcbe}}, './file1\x00'}) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000004640)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r3}}, {@aname={'aname', 0x3d, 'trans=fd,'}}]}}) 23:36:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:36:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xc0fe}, 0x1c) 23:36:31 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x104) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r0, r0, 0x0, 0x3) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080), &(0x7f0000000180)={0x0, 0xfb, 0x95, 0x0, 0x3, "0c3bac4a9ed7aecc6608ca26c1e09ada", "103e807866c1eb411215bc133a6d5c95690e12428d63bf710afbd3c6e01fce2672a98fb8c00edcbb79d58d6fa7c96ec4b5941a8f870b4bbedd421201f94abadf36aa5b033ad663ba888d9dfa857ab7b931d65aa409b1016a887fb3a77f3078b46fd1bc6ee0d65457953c48059853ebb53be28084d23f76f118dd70e8af0e65a3"}, 0x95, 0x2) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x422902, 0x0) sendfile(r1, r1, 0x0, 0x3) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f0000000000)=0x10001, 0x4) 23:36:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r7, r8+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) [ 2479.728593] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2479.733480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2479.740725] 9pnet: Insufficient options for proto=fd [ 2479.779183] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:36:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xe803}, 0x1c) 23:36:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r7, r8+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:36:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:36:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:36:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xe8030000}, 0x1c) [ 2479.885979] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2479.913237] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2479.926055] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:36:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000001c00)=[{&(0x7f0000000580)=""/215, 0xd7}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/238, 0xee}, {&(0x7f0000001780)=""/119, 0x77}, {&(0x7f0000001800)=""/154, 0x9a}, {&(0x7f00000018c0)=""/114, 0x72}, {&(0x7f0000001940)=""/21, 0x15}, {&(0x7f0000001980)=""/65, 0x41}, {&(0x7f0000001a00)=""/207, 0xcf}, {&(0x7f0000001b00)=""/217, 0xd9}], 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = epoll_create1(0x0) readv(r2, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/21, 0x15}, {&(0x7f0000000180)=""/67, 0x43}, {&(0x7f0000000240)=""/43, 0x2b}, {&(0x7f0000000300)=""/133, 0x85}, {&(0x7f00000003c0)=""/198, 0xc6}], 0x5) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000001e00)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="24772b2bb4908b947a890a7b6f920ccf408779ee210b7a2d45f82094d22378df65836860f440aa035790b4c6c4e138f8f06c905b2143ec2befb1a1bc0b1fc5f7f64637cb416cda2795a9daa20f8c24cc0662ec4edd230c97c68eb2ff874913a664fc8d62bd4b17070a2e9dc0b4a1822757d633105850e118e911a10090ae735e8cb141b45e1ac137a5fc772ea91a960bfa9fd41d1df96b61f762412ecad08946adcc255eeb492b67a8684d085d813928a856928899861d7d2f868633e055167739248973571e88559b9139f4d8d9bee2a7c2f5be274bcf0f0bfae52058401770d15bf89c6727f8ea8521526ba6527f86c19976503240c57a", @ANYRESHEX=r0, @ANYBLOB=',\x00']) sendfile(r1, r0, &(0x7f00000000c0)=0x8, 0x6) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) r3 = creat(&(0x7f0000001cc0)='./file1\x00', 0x1) creat(&(0x7f0000000540)='./file0\x00', 0x80) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x46e2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRES32, @ANYBLOB="c96f19de8c5d09002662090e02f6010ca2ecf8c44efb47a796d74f9d53502a56d410c7492a47e039fa8aaf04d1de88c2529cd64bce7706b565449daaa5d23d207e471fbadde1435500d083c6edad3927d1775624a43e07689f7bbd821174b429d5342d41e33fc112d74c3e764182076079a2acff4c925cb0226b60342c78ed0b70d0d4f855df68bdbbf88d82e7fb402597ac51c6a38eb00d27488eb840e0180918c5ffcd9033d31b4c9be2f636be", @ANYRESHEX, @ANYRESDEC], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r3, 0x3, 0x3, 0x8000008000) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$BTRFS_IOC_QGROUP_CREATE(r4, 0x4010942a, &(0x7f0000000540)={0x1, 0xfb0}) 23:36:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:36:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xf4010000}, 0x1c) 23:36:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000180), 0x10000, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 23:36:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xffffff91}}, 0x1c) 23:36:47 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x24, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}]]}, 0x24}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:36:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r7, r8+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:36:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xf401}, 0x1c) 23:36:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet(0x2, 0x3, 0x80) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x100c5, &(0x7f0000000380)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@uname={'uname', 0x3d, '{'}}], [{@obj_type={'obj_type', 0x3d, '{{^$'}}, {@uid_gt}, {@euid_lt}, {@hash}, {@permit_directio}, {@appraise}, {@appraise}, {@obj_type={'obj_type', 0x3d, '@&[&'}}]}}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000000e080)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f000000e040)={&(0x7f000000df00)=@report={0x130, 0x20, 0x10, 0x70bd25, 0x25dfdbff, {0x6c, {@in=@multicast2, @in=@remote, 0x4e20, 0x0, 0x4e20, 0x0, 0x2, 0x0, 0xa0, 0x1d, 0x0, 0xffffffffffffffff}}, [@sa={0xe4, 0x6, {{@in6=@local, @in6=@private2, 0x4e20, 0x0, 0x4e22, 0xcf48, 0x2, 0x20, 0x1c0, 0x6c}, {@in=@dev={0xac, 0x14, 0x14, 0x3e}, 0x4d3, 0x2b}, @in6=@empty, {0x7, 0x7, 0x6, 0x1, 0x8, 0x1f, 0x20, 0x406c}, {0x6, 0x101, 0x8, 0xbd9}, {0x2, 0x8000, 0x8001}, 0x70bd2b, 0x3500, 0x2, 0x2, 0x69, 0x3}}]}, 0x130}, 0x1, 0x0, 0x0, 0x2004c084}, 0x40040) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r2}, 0xc) sendmsg$inet6(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0xa, 0x4e22, 0x3, @private0, 0x3}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="fe53bdfec9258b4ddaa8414150677761322ad89ee6f28b676ba7900a20a5fd94ef0a5032a2689228621cac55436b4e179dc9a66287f4e5810454dc34727cd7ee729dd8bbb601ff000000000000007d5224040f98e268b7b217b8cc43f0643dcb00"/109, 0x6d}, {&(0x7f0000000100)="0ac6af97f21b059f222048d390", 0xd}, {&(0x7f0000000140)="2fbc74285750146028013b0c78e7326c6657e846ef468f39ef7413f4f79ab95173c1ed36a5274edc0100bd5182162bc2e856e6d6d0f1c361319a451a4ed17ce084913969077381314374d079eca438b1a5c766e596a347cefaec6aa074f48e7cd355d5a69b7fbbe716fadde2ca9d5867e3b2782c4a34", 0x76}, {&(0x7f00000001c0)="3a5a999107fbce515ee2d61b49c1acce0e8aeaf886b962ce92fbf1f506295d2e346550a9f28726203f659b775060e5937d3ebdb4524cd48514e33477b0ca498424d976307a2347cd0b609a1b20d8987303727a47cb434f837373a7293a96cb25cafbcf21d30171345f9aa6090aba9610abff19e564a84f9a8ba980c67eadd5295d707878718612bbd72cb76119dce639fc13c8e4cec6f9dcf0a7b5", 0x9b}, {&(0x7f000000c100)="07a2de47b5585576dce1405312447db0ae839ad8d2de78c934714fbd14e305b03e915e97c562c463b03ff3cc0eadb52cb89e0dec70a99f148b52769346823f7dc35b53bfd0d9060d9a368f6cd7b216e21ad78e79bddeaec40f37925fd8c5ab25ac791df039ebeb7c2074894e9eb55043afe4f2a66d3262ab4ece710f5b0720abbaf18ef9d22bde829ea5d909bf4b1a00172903ce2a3f93b25a5ad1c74da95ab2564fd32efb1e29", 0xa7}], 0x5, &(0x7f000000c000)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x6c, 0x2, '\x00', [@hao={0xc9, 0x10, @loopback}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xd561}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x2e, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x965}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x2b}, r2}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1ed, 0x2, 0x0, 0x0, 0x0, [@loopback]}}}], 0xd0}, 0x40000) r3 = socket$inet(0x2, 0x3, 0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000009100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000009140)=0x14, 0x800) [ 2494.908924] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2494.915829] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2494.926936] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. sendmmsg$inet6(r0, &(0x7f000000ab40)=[{{&(0x7f00000018c0)={0xa, 0x4e21, 0x1, @local}, 0x1c, &(0x7f0000007840)=[{&(0x7f0000006500)="4872e04524ab04ab46279540c32570ecde5ad0372b3921a42ddca73941914609c6fd730e5031e4b99eb8a1fe90ef4950328e2d6c209a63a033a48bc238ee404f479adbf36f2ae971d7f60316135988d9ea9c0bcbb07f07be561813cecdb31f0a5572e5d43f2ad5484d391f035247d02f73d3c637c7e83e68d66503e3821b587683f96d9d44", 0x85}, {&(0x7f00000065c0)="57cd862aead67c6e2d619bab4180ed327f720275511e3ea64f593466eefac7b73ecb74a274643b4421839c894731b1a652d7897fbd07a2b285924ff96c5d0bbb2a7ba4231de9ab125a0545a980de5661dbb54081df78d9cc840ecd63964a29a4db78e3d1b2453302d6940673745bd927507526f8088478f5fc5daef859c5f9aa694affc362425d525a24161e951b3194ce561c6c0e2ae3a46d31c8e681b1a0997a2159245da7", 0xa6}, {&(0x7f0000001900)}, {&(0x7f0000006680)="0800d35c5f4cf0c2165e556b119c4367a34a5e2dfa1cc56eea65d3f0dc8506132a68e26be0357c2952751634f9d2b87e556832e227691c7160c1da7318db96bb01db0b377a26e5", 0x47}, {&(0x7f0000006700)="01ede4109d83ff8cd76e68c6a47d158077b5443d249056ed615f3223b30ab7c12e71ee139a76426824e2b38c7da7e5413977357517ec546b5a2b2a1eeb407a67ff98f86bac991a73428b468331099dfd8f9c3f43cd60a9f76997e18d5f3309cc49a25d0cd366c279b69f", 0x6a}, {&(0x7f0000006780)="f72a2f89cd375333c2e932aa6e4925a05811f8e634ac28cd01063ecef03f59fbb50e2339dd23a28a3e6f7481a498256c34e5f5561e6b95789e40434235c855e5c00042cbb47e485e3352ad92f2543a0e84d847963efb87fdea2405ccbcee311e0a4c811dd588a3e4c9c455d766170c17bf6450eb1c62bcca2abf2e1429927575404ec261f48fca09e4b8760c60bfcea25e02a7caa1718ceae7ede694aaf01c2476d3e7", 0xa3}, {&(0x7f0000006840)="117cbe1d622d0a12f489dc6c55cfbf4f1f3194bb405f39553539c7643f9a180ef9df4bf549267afac65b4a5a044c8ee91b4a561729b4a76449213d874a96726cbea3738259dc19f04966b425f6731395ade01295f89dc16468b7490a853a7603f8b815e6afac36129807f51669d6d9266cba22bcb1e9e839bdc715bc4d3c07b849b11532b8e420c8c8d8b8bdb0d5bf6f739cf79b7b2fac1f3d48891d9108b123b03ff87c97a41eeb08d7c439da0f50c34cabf47d7b526d6b370bc1ca0c496cd201fa7146fd2c1d311529268fc5761a33369c3d8fbdff40b117cf7a02c1a3454079db5f46f1c2e37fafe2846a3267ce2558b18a96590f878219f3ff05b2c39c487cd3f3e7c043f4f6e0de3bd42853ccd0bf7820087c902727d76273424045ac4455325cfd9eac406ed25e8c3d7b7494eac77834b3282c4de31737bb0b3478656980d64b3223612fcd4a2ec0a888387b830a42a2ff59c745df95c77b349dabb850ba3e37fff758cfe418736f0a38f7288a9e6ffa7d0a925fc2903fec374fe00b4f3e590e8d17dc140625fe417dbbe5347364e2cb8975442aa3f9d276b64c4d15023dd345ee041211397e715155673365bdf716017233363ab08e0001f4c2a746a4f70e952728ea9c920c8f1db9b141f694a00201af14ee6b762ccb374ac9a29abdbe750bb2106198651d4bb57058e00edbb8171ba388268a38656fe2c636e7e616838b0438284c64c1919ecb469bf0be234667f7f8b37c312514ea2bbcf2fedb70b4883d75dfe3a8333f97c6c42d5ca8680e80f28a11c73fb6e412ad4e9e6f035ef4ac31abc089ec1c85753a63d6d6e9f15467c332c7cd514bf2c002a863bcb48c00c860052c64d939687133d1045cfad8824ff9775f30ae051ee0d8aea551052169e96444a4848d261dda99f084ddc9269995703842be415e2763868c132e52f316d86524668e357309adf86c2a5fe2c3e24f693d8cc67779f1c77bd78fde375e750dfcb01e6949d2b783166aca9cceb35e19cb471110245a59224c6af5b9f94046b635ba9434b6344fe588e81f88120e59b51087e2bd81d5aea76946780903bf1ab194b247a711930f2aa8bcd586aa32c278097f8a95b79ccc5268d89008c3bf1db7adf525d1ae474f3b7af1330c32120cf117fa752095bf03b99a8868739c21436ec6e34df547ee98687ddfb66c955b107f428abb470b050f857bec27731f66c5474e8475bbc3312a2d952bfb308c730521d0dd96548cb19bdcb47317b0a0500ade4c97249f9f8064aa1d53233a3ccd9a9e9c8d71f268a55ed9e6ce68e9474afde5c79399718c8b8de80b0ec48eb25c36b9d7beecab6eca3b85e29517e2b09d011a4f60965bab90ed60d2b3ceb868d5cd708b07437e2cd911a3bb664bd5eb0d0c6da7e324251649589b9f08502a2c5e23123fabfebfd8b006c59bd535358a50e19fa41599f3f6ff4600fdd17adec7fbd61b23c7e98157a093111e6a641c2aa141589f316a2728c42ce90b1a19879d63c21e67c2e39147da1287854394cdcaf08718a3285c0d86b20bb929f268774f55385f114f09d72dac5d7b2fb3c69c8319e714b86bd61f089ca4dbcb16dde59665cdbc3f0201a6e1d81c56ea872ad6a040fc4297b0c03e88cb4962a0e2cfbf19aed0fc695e5f6356839211f9bbc226993079cb495c165e0eed1b993dbda452db9cb1c1178e60ebbd7f4b8f906ecb781bb22496be0423c6e4d63c6e56e7f212ba33edfa91af914461c970c50f7805d4dad2be32b42f8bd0a44ab4aa943f4414fc84a27ca5e9a165843eadde28b236a21e42368837a53a3433e25efe31c53518f86d9f4bdd30db116de8c7c1d78dafb23c3d09d3cc413032540e24aa7ce90733cf89bb0d9fb0418e8182e6785401d312c7e319f8d8fcf699c597bf9a6fa5cba6db24a6989f85e5dde3345a7500a2fc6c366906cc1258f61b6b3dd70537043a71cf4691f19443008ebbd5ee0cb35c1ea0a5b41d7ab165d3afed311396481d945ce8ad32143d0cd056fe8c85e3ea08566ce15c1d96dfb653a651eeec0ff1b0285882a9afbc5604a321641e7296866430c4b9a0e3ff468c4a231de8ace0ba8b9e57ec21d4f5735559af7880b2f1e26d979262c5123a92b54e31c4c5748e1832b241a174705bbf2621f37602249a79fd288c5ef96a690f3f5a2ef01126b9eded41e9fe54fb0e472350a8ff6e67409449a8e6b6f987efac738c86a15a489a75a54517870aad94da0fbf5d0b65b2df11c7bef240dbf662f0c3d558d8d91e8580a42cff71eaf559a3d7bbcf4acb5c5b6fa5da56f6bdc34bad3979dcdd293457467b81c3680c852994fbda4dbbff4ff5709c216513109e3022fe6a2952e7befa27cce4bb0468d3843c95f61b8a00b899dadcea5e4c6fc5d63c991a56090945aed6537fa5c11abc2ee6e98e8153ae691bc3b84cab7169bd67272c23abbe08f93ead634ac729865d230147332bfb3a3e9667e4623f98e8646ba63493e17ac2e253d3b22db04132c27c98f118a5b557d66e4ada594c711b3fb9b7d68430e1919c61581e4f042810ba81f8702a17ad3ba0b628b8655d9c23eaba136aea347f3bdcbe27865b6219a3f4189e3db8ed50111f58127a7a1fea463c62c466e064a7bf10461e56dcbb77e2589c4c92285a9686b84638b7464a42a7732cfedd0beeb1a8ca8e21a4bdd3c39609a17c894ae6c4a4eb0be5f52dbe0071df526bc52d2f5ce0a9cbde77cff1eece1d3ee0648debab385f13fcfadfab9f1e60ab81332ebbb2499a273ea682c682f307655b2277fd8b637e4651d2c0b60fc8e7ce87dc05f9bf2ab4a120fd2a1cf2025a51ab28bbdf80ad14ad9bcc04f07c46010f88d5f7215c0fd186b4fb414aeccbfca277768a926dffa5cd5c291e0f0d5ec8a232ec986a93a167c81e7232dbf521d895bd5bf8e84e542822c689e208a40b0f010e429448ff5a1b5b42c610527f70185e0f6c1962b4312cbf2cbf19bd282cdd86ceed6e7db3c5a0378ac5bc1c945aa2fc89e55a5767cb5a894347e23ab5e14c68dba6c0186bbc3fa5337aa0459f3eb6ba504f860a5c19e95ed8c98a74cd4a85b5140810eb410d3f60b12a0db4c8ae06ba612b2239940ebfbb929d6910cde5310e01b6bd66c4c9bee0b828fa5096947703833c0379870fa509cd19fc7984463eb59ed5ff5426c0bbc5c1d29628c394f17bc9612ac0f80e20253e41633d2d90327d5015510dc63fa83b797f8809584fcb3ea47ff0822115a8ab629e5a8ebab2a1393c92cd939bb3ae7c21dccee029ca8dae8cc16eec19fdbd2a806b1ea444b389ffc2e106b7f04893d58511510b8f022f1148426e8f823ef18340a406a93be3dbbe93a34d94249784007159705aefeaa87678e79224d48a33ea12e4112e37d31359d20d153be9032db3a7934b0a4a706244d806be6e540c73675e99d73c688af9c9243a84054639d711e4332ca417c16324f2ccf660fd616651db2b4af7fb0410ca20428fcaf8a555dd116e59e0f225817da02a1053ec7c10f798fe733df809c176e18f2ab421519ec6ae8aecbf108de7bb3fe9bbc4f911cba0baee90979aa3e65d40f79187a0a2daff9c0d32510c4bcf13e1de00fc462653a436592a2727b9fb4c72d33ba2cbbb3de751e565dd81c218fd5cb38f59f71af9004fe192dda81098148b91ba2d17cd9fdd28aa8710a69f0434277dc0876405f52ea28a01cd529011b7e64063cb9f53c5a57f81eff374378653351d35bb94ca64e12990697eb9b88ddb62115226c53c52515d45bf074f1069d1b4cbf664901125f43c8a9cf0165a7171866c4fbec96f68b52e6feb57ac81e809353e9c393773f803d0fef154d0f5483211614aa9259e99f0179748de519d0199af7a9af796532f9925f3a90ec23e8d5d2460437c102c2243713844127baec412c5679a87cd0ab0768f39ffba0a9542fcc34fd5fdd138727dcac8a35945a05d488863302596605e6c9d061eff373e59d0ca9f44c5c604060bcd30aac1bc9fbc7e89754cc2b271c50a004e5ee923c077b7d25b08b619b2dfbad3e50a55729a8c6276b651b33b37f2dd1f8ce8b4a1d91c5549798b87c70d416fad2a935a1c1ecfb537d6c285e047fe2744da10a9a61671c2e503b1d16e434686bdf87092484667199cd0fd6b248367d3bc7ce903bad90f2cb3bb82e7ac23e7ab058d952cf2456bbab3f4fcd1fdbaf3a95a3418263b88407bac83d3c1d0bc736a5d4158e03f796bc11aa4851f335888abd428c580b265f7d3a7c5b583fac406d72d70fef47e25826664e3cf9789849380dd4975ac9d7477e94c4a6de0c1a51b95a9bbdd167c6eba34c9baafd35e388a4da915bf9e5d566a7d8b182d29cbec3e6fdbf6e71025b9bcf9fbdbf23141d6fb9f0a416ea2cb7e159e0eb42a6d1450377495ed0d6e760b7bb6a08e1f01c7e5529aa8637ca4f858f8cd5a073ef25616378feb52def4ff70edfe334a76d1ad1ab178c9d851bb13186a418872798e401d2e500da9b7916cbe13cd76745ca8ec684396674fd619a3e15bf3aa57fe1539c360907e448d90a2bf0e37aa7442e7eda2518935075be8bc03fd52fa17bf9c24c260732a49288d5ec1db7599e23f678b359d9dfac6bf1299cc55ced26cca4b5b86aae6f1943015901b37ac9f9d2a469520b84361c960154eef9609d3b3a29807f13ac1f0c9a0222e857dad27e983a453b9a8ec939a10ae0cc5a0cb961364d571f829a1e5f1f3113c5ef01af7250fc47dfa8563638504a94fb317e05a3e57035d631a6cd84e54e9508f90db06a83bf878c4c6c6ae94a71804b8073f06758bf13a3a621d624cbdc24556a180308a2dd453b482d496095215335841b79d770f3cd5b4257fa9739a0e5ad097f4b7d4342bff06282f9e6c92db52e375e5297e2a755bcc22167b72a548b42f44d1a9fc0b3a4d2ba1801c66f82e6abf1458b035fb0af42f12ffb3c96178068cb93429bd9ca0e323eaa54d3af2cea4d083c0794bb4aeabd2bc5a966b58085900e5f19fd0d7eecfc2596762db97eaef9f48ea672185d7697ccbbdd1f7f5535abaa94afed0859f53fa9a94f608f0dbaa6e012a31fbaa5460c724062eeb7b4f287786ba6f1c32982efaa3fecaab71a576343297e0ada80a8883d2b2d3617982ced21a7bc429d5e088f0e4f7b64dfbf15ec878dc257389fc9d945970828cab2386bfedd0fab649ea29c4880c3222eb1b18b0d32c995eb4f8c091235eca7d1a78ceef523d9290a85113d1532fc01715658c6f6ea5a8e142497b377bbd1cacdb09e6ce9a16734880f25aae66cb7af8169ea1acfc9ed8e7ee615084bb8dd2fa5bf89f57bd48a22606a824a5a7dbd70584749071cd41a7a24cddbd1273f84e04cc5e8db79efa35d5f4a016ee6823a96c84fceab4f38f499de610b22f52d7abef6b3aa9fdd7f25eaa087279ba0601c42cdfb257580da461be6ca962b46ec5dd1f964f9c86e49b0d7063358afd651eccedfe141c7d4659273a688d1ed9e09592fac001c1aee0d1350bf33e2a40c7337c3476c87165dbed2f66c2ddd2c2b2d4c056702977dc75a0c5a917ddb64681ec0b923ab7e8278a84e45e8bbae252656dfd2633277908cbca52a82331f345f486e3ce27692be6d0ac7bea9406b52d3d2b7e150165f51c4b754de4daba0d42fd2952c4c5e0c1ee0da18cfe3aba2dbdccc91737ba5cf4432d2d2905bc4215d2585197250f8e51e10e5abfb263db5c4a25504e7113de4528658416dcce4be3e6421264e1e01f42039cc778604b4f6c3905e4954fb5392b2e859d8b54d7333c54b06f3ea41ed5f9be", 0x1000}], 0x7, &(0x7f000000cb00)=ANY=[@ANYBLOB="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"], 0x298}}, {{0x0, 0x0, &(0x7f0000008fc0)=[{&(0x7f0000007b80)="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", 0x1000}, {&(0x7f0000008b80)="b1a102a52719879eaa0bd271e90556ea6cadf842a594de53eb793f5dedaa3432fe35b80f3bf0a1963f0a4c405f661083580d306058ed25e664f35fa621aa8e0214c75749055b389428121c4c189c7432821c56d548b4d4af7d428cf7e2773cb4d67a2c0a0d15c6f1b40aa60b3ca912656bce57b8b9cf9c11579e8ede7daf7fb64c401b9d75fbaf0c8494594288220fe9de05162132", 0x95}, {&(0x7f0000005cc0)="68e5b6cd0d7cf32151397daa4b15", 0xe}, {&(0x7f0000008c40)="1dc48939a88e871241542e66b42f1766c89e98860840e5207938d90f94dca4313f8f0bd67a412bf81b6ba111856f60ae7f758650330c26ea69aaf6244209398de085a501f968cf924bd16d834370035b0e4c997aad3d20e649027525298d1c85820672a7133650b7284cdfa84464d5844f851fb005bf8179104eb803909d34783a8cb85b", 0x84}, {&(0x7f0000008d00)="dff7e59d580cb468f219b9b4a1e923dcf33638cff952699acd725c0b34d3f990e90490df34a11bf53a5f758543e6fc6aef5325fec40d2d13b03f37f811535083d70bf97ce55004d61a36bfe810977943386dec04a87bc588c5614c80c982f3369e6ec439ee678d441fa2f644451b308ce29caff03e9e05f68b7d0e1f8a12b6b1b47ae548742d9b1097d15bb87109bee0de0231ffb0f1637e4489861f5f97414e4433565cae8bbb756b4ba7ad95159ffc43260e0db443e2cfc2e6dc8166586baadedfa2018bbf24e834024d5e750f1dc966375c56091c0845d0a9a51870f74145fa", 0xe1}, {&(0x7f0000008e00)="39e281ed87a0c3ab8d006cb129d028466134b834f532a9c502490e476a5b6378ba982f09be6c234c25269a051ae6776f772efd6894e52232a24e7d72860fc4d9361d456d07fd8613e36469aa31eba9b8f9bc40", 0x53}, {&(0x7f0000008e80)="d05e8a9ad06917e796ca92a260", 0xd}, {&(0x7f0000008ec0)="9c24a345854eb9901a356c86e644e167761e4f211ad25168ce44f1ce62297b25086e2a588408fdf5b7c99526fbb6573bee0ee0b94db2a93871f7a5124e82391874f197c7c78d2be085f25e3b1e501b3edd9862846f2aaf36baebcf4d02bb1cd36804cfdf4d8e8e60d1cb575d97400ac48e30d0a4ff7e015a4840d5f3524ab479b4eafe597abce35c89ee169710a806f88b870704972f0bba65c20b39346e0e6e412b20b0dc62bf32031be71687b32c17ac9a25ce2c65cd95723accd09567b36bb8f9f80f70f8b0145188bac4d1bce9431124458ef52d50ec54fbb3e8315876e07f9ce0e06e63bb8884ea02c43acbef0d", 0xf0}], 0x8, &(0x7f0000009180)=[@rthdr={{0x48, 0x29, 0x39, {0xff, 0x6, 0x2, 0x3, 0x0, [@loopback, @private1, @remote]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r4}}}, @tclass={{0x14, 0x29, 0x43, 0x4}}, @hopopts={{0x1180, 0x29, 0x36, {0x2e, 0x22c, '\x00', [@pad1, @generic={0xfd, 0x1000, "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"}, @ra={0x5, 0x2, 0x3ff}, @ra={0x5, 0x2, 0x7f}, @generic={0x2, 0xf6, "2fb90b3e8302a38e49b7733dd34693fe7bde6e7b3dd9f53270a1c69bc44b6fc5e6fe83383c087fae5596a4514d4a11faa8405c93a5e1e7d39d246599d910491c9deed63ef7c1622b0e8eb9a5916928c508921ac7dc0cf09f888983f5fd82c67b82462fce8149c7cf8df3273c35415d16f8f9296d2b9cc1b85726b05aa777916ffcafd3169556c166bccaefe49c818ca6d9009c514e8008f38bcb7f9e6146612401c3a841192966082ba3f568f051aa5461d31a19e957f47ad49cd75452b5a1320cff3149c5ebeb894591b2225be9beb54d6ac8d6ca62013aad4588cfbc68c7aeb8d0dc3ef7d3ebe2d8a21fcf88b34141541fa2fe89d7"}, @pad1, @ra={0x5, 0x2, 0x7bb}, @calipso={0x7, 0x20, {0x2, 0x6, 0x20, 0xec, [0x4, 0x1ff, 0x2]}}, @calipso={0x7, 0x30, {0x2, 0xa, 0x80, 0x6, [0x9, 0x400, 0x8, 0x4, 0x6841]}}, @jumbo={0xc2, 0x4, 0xbf7c}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xa13}}], 0x1220}}, {{&(0x7f000000a3c0)={0xa, 0x4e23, 0x80000001, @loopback, 0x41}, 0x1c, &(0x7f000000a900)=[{&(0x7f000000a400)="1ec4eb5b3c5a8039de815a6b91089330027d3501f79516a60c7d5c9150743db5cc48e500effdbe484378dd300d578b1c54e312dadacd212c7ef9aa5a97df2ca5c19ba4861fbacf89174eaa9e1e2c3d85bdd34e5e357a01e8e2c3d7419c2c38a5a6871198883cad76bf0af7907a16c320d3a63ab8e69b79b28a046ada3145101bb8a3d829a0e0a6b52011f4f529d9499dd6ac82ea669b002aa3b661c3a993f924a9d72740c8bdacae", 0xa8}, {&(0x7f000000a4c0)="1398de2a6faebebf33a11e48655160a3f15b7f93d6c0493bfea0a613c88191877c6350d9bfab553cc3a2d89313c344939dc94f093cb78632cc2464313a6ab03e5e6d30aaae5f68be569023d60be205c3c547028f9dc1405250b3a80fe1537a6e312688790db09d7241f2e1acce84f07b02abee9c3911e951d3265d2ff0b75699f97f27b234762f74f48fa8a350b26b3ee5c2271f672944839a635ec21fae44742da0c7adaeef886a327946f704cb7464a298489969227f8ca685e6d5a9607432d4f1", 0xc2}, {&(0x7f000000a5c0)="fb67eecd6277214af74bb1d091166711a1db99c6846639dbf8ec286b9dda872a441eac04cd95489707cb6555c943f333f5cb2657863def52e044e96ec2dbdcbe0f94616cd27ae0079860490f7d61b5f5d2aff86d7929ee05ce190f5cc137be8baaab2b13a0bf769b7bc2d2db9b054f6397cc90ee4b9c571dc22ff96a82bd4d18bd5263460b6fc4bc9ccc903e1e0669c701d309d68021187a1dac024093e5a8d0e1884b48121da9cbf7aed19d11f3550c6f0fb3c5697ecd776edfa3664f18d327d048cd34b7c2961a37e609be65aa", 0xce}, {&(0x7f000000a6c0)="8308248dc7441515fcd5d2f9220f6a870856650e8066cdc8f96c796e716fcc72dae4a78cfa80d58625dff6aa2b789ce65780843b9b8de126bc0583482e251017e168ddcb21c064c3d57bbe281c33bbf5b3b57493a692b8d5a347c04bca7f49c5e9a4cbbe", 0x64}, {&(0x7f000000a740)="e5b16a848206c9b00643295cd18825d216b786859bfb818346202de9a97ff19f1190f1c3264082889b0d68df08f3dc790939f440a2d253762e83d4ccf4477597ac6fb8fcb5e4a326101ab7f78a4cc6fad324f2a3fd7be2f6f0e4932b04b71e", 0x5f}, {&(0x7f000000a7c0)="df281d49761785c107abf4c9876adbc19d5dc027bb681a1c87ecef26e62a5c7f2a34eeebb20162abd2569dfc9190bc017c6db558548bae0314f199e9fd00cb754576ef0f58e4df22da984864d2261ad8c11cd488bfd1abda580a0d1d62b947", 0x5f}, {&(0x7f000000a840)="01e87e206ae51cd78838c804c601288ae546648986372aa6e16b8c4438c0b585aafb639c3f8cd6f8866e7272cf01ba3de548845c00794e19d356c540fd49d0e888f9786ed2301b1e11b6a1ead44a5302cc1b6feb3093eaae43a6318546498b77f5dfc97deb34ee8f61cac9e8eac26083da8d52236435d3ed4542ced56531a5921a2afc9794da87a2613cde7c6212c58140a9", 0x92}], 0x7, &(0x7f000000a980)=[@rthdrdstopts={{0x30, 0x29, 0x37, {0x3b, 0x2, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}}}, @hopopts={{0x70, 0x29, 0x36, {0x5c, 0xa, '\x00', [@pad1, @calipso={0x7, 0x48, {0x3, 0x10, 0x3f, 0x8, [0x1, 0x9, 0xaa, 0x100000000, 0x10000, 0x5, 0x168, 0x650]}}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdr_2292={{0xa8, 0x29, 0x39, {0x2b, 0x12, 0x1, 0xf8, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, @remote, @empty, @remote, @loopback, @dev={0xfe, 0x80, '\x00', 0x44}, @mcast2]}}}, @hopopts_2292={{0x50, 0x29, 0x36, {0x4, 0x7, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x9}, @pad1, @jumbo, @calipso={0x7, 0x10, {0x3, 0x2, 0x8, 0x1f, [0x2]}}, @ra={0x5, 0x2, 0x5}, @jumbo={0xc2, 0x4, 0x1}, @ra={0x5, 0x2, 0x2}, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0x3}]}}}], 0x198}}], 0x3, 0x41) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f000000c1c0)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x23}, @in=@remote, 0x4e24, 0xa6c6, 0x4e21, 0x5, 0xa, 0x80, 0x20, 0x2e, 0x0, 0xffffffffffffffff}, {0x5, 0x5, 0x5, 0x8000, 0x2, 0x0, 0x1, 0x3}, {0x9, 0x20, 0x7, 0x8}, 0xffffffff, 0x6e6bb4, 0x0, 0x1, 0x2, 0x1}, {{@in=@multicast1, 0x4d4, 0x2b}, 0xa, @in6=@loopback, 0x3503, 0x1, 0x3, 0x5, 0x0, 0x9, 0x2}}, 0xe8) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet6(r0, &(0x7f000000ca80)=[{{&(0x7f0000001900)={0xa, 0x4e20, 0x10000, @private1, 0x21}, 0x1c, &(0x7f0000005ac0)=[{&(0x7f000000c2c0)="462c5e4d94158158e74eb2dd70022a897480448e25f35b5703d10996945db2d4c1faa1459f3042243607c1d7d3fad4ab661c7b73b8fa929934a607d8734258ea5888d5065459c786f48ca3389ec0b692150ebd424823f593005a9bdafe7d47ed13b8095fbfe7ce349de528dedfd7ebc816f78152473f3be1782379f783f01ceb2e2a25c1bf8d4a231db7ef139f1d78a04b459f5c63fb9b555f459fd60ba8d5", 0x9f}, {&(0x7f000000c380)="df569b1db1560b3937adf48ad6a1d12e1bae3ac8bbb54f08105bc68ea092cceb4f398aaf944b48bc960f677c8846508a664983ae219f34ad7319f9c61688193f923f1eb346ced49716cd44309c9d82f7dfebd3e15010fedf75a3d4f99c7e6d59ec8b55fb871b7ae44185bc48cd6a3e5785ba68b329738ba3826459b1c0a3bbe2ecf81d9c5afb54e4256e69fbee115c01ac2601a6c6d0d80d923371d6ab01b3429d782b5e17a2018b279a7981f661730d18aa3512ceaaa23eb2", 0xb9}], 0x2, &(0x7f000000c600)=[@dontfrag={{0x14, 0x29, 0x3e, 0x800}}, @rthdr={{0x28, 0x29, 0x39, {0xc, 0x2, 0x1, 0x4a, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x3a, 0x1, '\x00', [@ra={0x5, 0x2, 0x251}, @ra={0x5, 0x2, 0x3f}]}}}, @tclass={{0x14, 0x29, 0x43, 0x80000001}}, @rthdr={{0x98, 0x29, 0x39, {0x32, 0x10, 0x1, 0xf5, 0x0, [@empty, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, @mcast2, @private0]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x1f}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @remote}}}}, @hopopts={{0x20, 0x29, 0x36, {0x3b, 0x0, '\x00', [@padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1f}]}}}], 0x170}}, {{&(0x7f000000c780)={0xa, 0x4e24, 0x31, @loopback, 0xffffffff}, 0x1c, &(0x7f000000ca00)=[{&(0x7f000000c7c0)="b8c035e6da4a68bd6d6fc06466f003f75113dcea9b1c16380bbe882aa239d229c11ac22a04d2c41f0a58602264f79ecb6f0f42e366fab9bbb20cf2290de20bbed375949ba39fc76cd7744a23511000df6cca876f2ef957befa1c5321e76346cb4365c346e556a9f1c1f024e9d06cb665885235f9e2aa90b18d14cadd2cf5d0f767e8a71002a43269b55d042f85e13d369df9e61455e060a19ce71bdc3cbfbd69aebaafcb120268a2013c77bff67bd1eb0a1786fcee8673386497cdb9ed9cc5dc1ce21fb034e8b4de642ade80d12c284290eb68de09d5948c450b9da6ab5f95138dc360e92af7597bb975d338d3573d6c2b", 0xf1}, {&(0x7f000000c8c0)="0c77d523acfaa9f40fa4c980cf588f2be0bbc841cc99893c39865e2469e31f4c88dbd58f58e7f0b7c5d9fd1ba18725ab943e5ac8ae11d16e2991042c6b76e5b15639cddec856cc67fc6b09e7003ccdc58b3e4b99511533a894832714f926b6aa5d5934c3eae2efe29e725bbf6390dfaff8c3cc77866d2c78e554e2176a78d795b1698503d49b6708cf937b05bf9c8491", 0x90}, {&(0x7f000000c980)="bdcccb5996f16a75fe4cc7aaceb4f58423c3bcc3e605408d4730c205c2b325c7ded7452e32dd67a7bf30594ba62e65ed4d1e15ea2fbc7cad880353a32553686694786b22f05bc85673bb712e73db8d424c54f31df3d2b79197790ff400821462142b99010dd9adc4cc1437362da459df9d2c62e336ca2c22373fe195ce6c", 0x7e}], 0x3, &(0x7f000000ca40)=[@flowinfo={{0x14, 0x29, 0xb, 0xc7a}}], 0x18}}], 0x2, 0x4) sendmmsg$inet(r3, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r5}, 0xc) accept(r0, &(0x7f0000003200)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000003280)=0x80) [ 2495.089787] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. sendmmsg$inet6(r0, &(0x7f0000006340)=[{{&(0x7f0000000400)={0xa, 0x4e21, 0x2, @private1, 0x5}, 0x1c, &(0x7f0000001680)=[{&(0x7f0000000440)="1dad1ddc392228694427a4a59daa9ffd03f02d56f3d65dc08efe1ae1deeda433185e9de302e10c313f852aedbbdd07af6211b98203fc3dd5bb8f3b11dedb4897993c4acaaa5612406b72034c4662046671b06b7570f2e531442f3d9f7a227470cd04ca0d750fc04d4f6a7be6329d2c2d1dac3bee8f566abb1b0b16cfba3b509d00d7ef90bb411bb3a06b7c42c533aea21ae004", 0x93}, {&(0x7f0000000500)="8382fbcc67f383035f9abdc94fcb4eb9251a31125b7ec5eb5dd6414e42b077b6ce1be040c2c3c29761673d77f190dac935b6617bbea622c196966841233c81f88b94c1b9b326e5a34ee56cd16f5d3d8f844b4407f5397cf1caa470dd2f6534a49db818fc4f456361205bb9c99724bf49e04f538ab4c9c13cbb68aa4970063320f9f95b0788d63fe3c4eecf7fd1b2e72d4064330f2f5e56af6790d7511043aa68c6a2d4865425d9257e7ca4f18e8dd8d8a3d9557776520bbbbe1334f1a32e7c23825c7428609e86a1fb966e6c7ebdd452c9017a05dc0cae050c6cf6876799a07000b65479c8aa1b98eed51fa5d25c2df5f2e10b7cf0a94cf9f805f04cac75a49f7593646bb501679faade1d3e28d1b9d4729fa3d365daf7f57ea6660118d33ec1604e54c8de8149c0bb7faa43bf760f115dd8269bd6d26ec1b147cbe6c78b1b8349fb340e50e70492390e08ee53df13aeb0ecae9ea0ec23f86c32b333cb4c4de544bfb8512f8fcedac2402a6a53292e4bfeefa332526854a59b88fce33ba8a75ef28fca0948389430bdc27fdb04b9fad5c5ad0c5fcce451940815e8fd00ec0ddc2133f9448be51c81381253d62fcb9a733934b82b75a3513d448ec255efeb378205dfb11e38f6bcf24fdbc052cedd51a58cc78419cdfd49269ffe869cc372933112570095e7baf9523925cb946a697aada13f3c7f678387224850e7d928d6586bcaad70478dce85949092413b1657cbb7dfe10667b7fc636b051c8e88b498c49f05b7cee173e0fd6b664cab300f8de2ff0fb0b9d0af101e76eed82be6314fcc79cd78e33c6a900dbf5fb11fbb7682cc3737ea67b051161bb23554ef0d9dc7b79730abb9159224f082932afc03fe190672ff76d214cff57b2cb1048e6d1acae0fd66de2f65f51500b60dd9ffed731672dd14530b88b06af92ac72603a31885b2856a8767bf85b188a07974e7585b3d7b9228663bee7d08d7e625a9f0833c636f382b51310771d8047299fd585979af3518d2596a65e7fa33775af925305801fd4a9ee7cf0def0ce00d146f7e574eaaa0d49645672ff33e6a60e31076dbd715d1414f76c590a541a8059fec42766601affc442025e799998a43a8c583e569937a4e14530966063d9d5e0174890d4588eb8ea180bdaaed22e609d85dd312cab0fee2b5632a817bcaa90c4c0e7efe425f44bf5bd9f5d4e6b68906c450fdcb301b2142ca9c551db2b8b5c690539217de579c2a36d37f1ff0891a6e29f92c14d63dda67c1543eb09519b636ab5b474ee32adc3dd58c79053764d7b1fed8c0c6798f9abbd948625c6fb4fd3239d01557832b346272182507aca8aaf5d32da8b2a4a822c051e0b76a7e4ce29926501343ac6aaf6d27cf848370c67ea0fa95e19402210d27a89c62b29e7c2bf13adad52aea52d6c3f7aa469bf140a0e922fc6c7e435c87c107908af2150fbfa27337e7a5a672890b7608a13a33f67fed94624131619e83b4dbf63e5dde568bd91f681751c3ba380715986cd6634f643c5d88104c80d9bafde5a115a465e6741f2fa3f13e7b445da021f1e2920403edf15d33e7a6d49bcb0f6ccb2183a36b4b1a99068b1423fbd30023d0030c191524bae21fdb46b0a3f6a1e104b5f300edf480bad42a3ba2b83ce9177a25edc1b48fa40fd742799db0a4aab6b8c9e396452437621d93374946c6d2a540f9b3728a66338628ddb21e3bc2640e2c2eb72c9c2b3d1fcf30a6ccab1b223623f58760fa78949db5bd2e0e8c68154c56347a98707d8b7afa8355aa74fe217ab324121d97a6f2173e7eedaf9dd8414b5f6acc4d79e11a5e0a54c8bcbfeeaf28427e07fbedf6e54b63ba240916aab55ca7101312386818eaedbcbbe197b6560e455b265711cee6d244996f52c105d6eee4a55ce2445d78abdbe05ff720ad50434cd008e3cf475830a57ec9544d86ad16e78287d3ad098cdd9faa4ea784970f3091b3ba1c2daef3df1cebf5a79d4ae8542d360a4ab674262f6c2c21cf9b3197229eaea215e6f7ccdd8ee7f4eba19bf24d42fca0b76ac0dbb28ed585d8e16fff83ac8daf9a204ce88760e9c3536b89906efb5dab6c2751f786193fbc0aba65f9388d4c1e40460b54374be407e3a612dc7775d38aa0163124efe503a158eaca3ea2c65c6cde70217b633ac1fde44530d76add0f94c71acadfc22d950118e4ff4b5970671674f76eb44806bcf970df803f90dfadfd53de861d365fa6668fb884d184e12b80d990d963aecc81bedceebe5ef270f8faa2820208c1a76e84c22985fd813580979c832d7f74185a24bb7ee1b5e0cd3fe618a271ba8f184b243bde58fdb5b821b67e529a9dee1fd10bec2b3973056eef9111a807ce5cf66dafafe0a46081c1039a5aaef3d1ae3fb8adfb89991739384314898a05266fcfcd62394941bce32fd401a3a45c1d0f9a34a920a3f1dccba42f301ae63ae5ef12740cbf266cad61720777c190e233166260ef60015c46fded804c0b35c6c629618686c020902a579c63943f30bb40fb325ea052fc9481f66ba9f2b203a78498f7720a43ab17d6186490811f2d4e5108a0e0b43cdb480e78872793b39f348e8379ac88a48c02b66385670ef7cc7224d2f48db4f3f7ced027b85bc4f0561b535d32212c33db1039111783159149751a463f951e219a6ad05ceb01ce117e9e8b8ac9e017e3a92d09f85fd53bd40f88bd1d493c553ae593b5a4c5cc34eee76a858baadab2a2a28147b9619547a2df8fda12f665c070b4b69345261de6deb7269fad8e9eafcda8dadd630a4126e3d1e235ccee9922b0c0f658a465b7a7afac3139bdb9e8dc2eb7b3216e7e5f4b5dc9d91902da081ca90a0fc0da977c522d35b6119f43842f8b91987fe5ac9096330302a454105672285b12dd6c543d1afeff0b6eced0b73782c1fc182d841a4412ffeb2ee482bac576cc3c85d17610fca97024d56a475cea6fa2d4819bc4a668d9bef36bd96780902fb669792c3610072529f16209d696e59fbd35709684243a3412d27f8e1f2f057163b37a1620ab4b305b293847dc40ad0221e6c440c30276c58032e69246c251f663e9bde9a55c29195a2cbf1cc4b0cb0dbeb61896d046a5c5c84a19510c69b7a1610074b8b15b38c9a5e85082817a28eaf5b138c9c5beba6a0c379bb707b35a2daf5ebaaba3f059c9558c724d1812d40008bdac11c51c36fa4a4a20598fc5d408672ab98f5d1070f465973610708ab7fc4d6a9082de32d6002006655158f07fb824a9d2b729c01a2038297273227390bc6a18f50d4155e1bf5a1d1a09037ad8db739dc7bc5cb4352a4de4da41598e7aece2799df8d9edd18d8ba43b37ca37bcebcbe9d26f1c11b29da0841dcd60ee40b0bfe0c1168fcb4f38e069ec956776e8e2343e2cdb4077d73ddc966b76002973b08939ccdea7a2ca787ead31d928907d894b2f5e4c6857b515fa0eb6603ecf66def81a4c4350b454f68c7fffb3a979a3c2dc8fded1f19436fce11ca84c72399c93b19a118b3bc7ed813fbf2f8f17a09cc254c60e24ca94cf380897c164981f96035bb9561a80dfc4685212a9bb8a6d4dba94bd6271ddfa0a1d64cfd5ca3342687789aee41b25a4b350833faa2c7630fa6cb3e1afb79fc4108e27bfb3f4f007bd2892020ddcf84fa3eb036ef6600c442351b2c2bc5bc5e8048ef194dbd4f2e0a88f8e940c451ca711ff0466e7b549753784fba35435752b1b07449d447fbcfac34e844bce7f00b244b5a045d92d24d3179cc29d4d1553aaca4f434f38bd4c9ff8a9de4d6bb0f68589d6290b7bed31c69f40ec0e0b42efa34b3b9d5317793512ff1f5dcdcb22f2d031740966e81ee1cffe1c477246835358d97de7ef89d5498f1960f84c2562f62cc949ce61aac77b78aa00462cb0323786f749ab78070bd0c4a3bda81906d22641594f6bef2a0726ea16faed19a2fc77a9f81f95112e6e6b557b0c71ac5433b782bfd3687e21e234ebe3c977fe6695765d6e5838d3c12ca69e1af01eebaa7475592f1cc5c377bba74a356c864dadb0cc5119f97775bc0e73e1452b0f5ed38277fbe24ed811ed6a99c6e80fba482469568d9b77973a765740017185ee8b2532674b2c3c0daaee9c6f3bb2e8f75602f73f1ad37ddf12b9fba0b58f81b4b8aa8e6a3469256c5e583c37247a6c47a60ac7642bafd7bb044cd47bacb282ba8a07e430c031d7dfd98be2b0f2fecb09303ce734a46ed2f82634490d227fbefd0888d64ea390bae7d384f04b31724d9f242866d9cd69a5e039d7abf1ef29343a130a57d502ff76f6dc512f9c4d4deeec06656f29dc57545e215068d78dc80e15395cf3b1cb9f859f94c5d8e70f18579c4f7e46c7ee7fa1ef11ca941bd17e9564898aa25c63dfae176862d8cc42606fb72c0f7409459137b4862810db3e4e9025dd672d8f91ba6b0b2131467bc09bd9e972d0b17c8218471eaedc21ad013e71be9e634a0e09de1eb64267ec883b6e24669d42c4f777da54fcc19edea42d6445ea0532fa47e305d6ebd572c640c406424370146f776fc25bb947334a1ce0b4080153ec266f762bb43da2b99649b330ad250ebf7c0f4bc77574235847dc74418216d8af3c9a79590e17d254581c24be425b4a1ddc8018f2d40a2091d18f44db519a0ad51eeb63a392b05b260971912f16424556f9fb203d9dca0d5587419c6dabbcb72957405a5060bb463f3138d5aa0f805cbcb04c8a49877428690f68016f10a3c1b2747290384d029ad9460cc6d1c5c115bcc12954ac8a261f74329d70000988bdfe36b66294fc27de8e4ffaf1393ba9c8daded788b14f7d3a909d9bf7cd0d863ea588343c5581c63f91100c91cbb5702434d9a77c6116f2786e0e8aa32c8c101012b71e26949f18737d4628da99eb9297b5ff4c60dc7d4ba8e3e6a785ef15a117f28c6a5abd9b6ca7b2cc1104f06f5025bd42b30bedc2efb4f9fa98bb391f384a4126c83c87d51f63c0c7838f5c39d919d0ee576df63921d0cef50eaca572fb06d88810ea3d5f33635dc9f509b123f7a5d2394a9b3a5e96fd30a2b52313eaa0492a86ba2df81d7656f00679406876dbf89f5efcae2c4987ef904c53b894a71809320a53dd45315bf919b441da4e0e34cb288c41db361887da45cb3536fa0bd8cc6c91c429cba267774e1080eb5fed10ee2d28120db7f31e774765dcc3ff4f7406bc8baa770e51e3421278acb34e695d04846c77b3dd449290d3ace18a262f3efac6913d872b797f54513b51eb12e3b91f851bfcb05e492640845885766abfc8fac5459106cbe89f7cee5fa7435ed98771c86e0e83a2dc4a48c95fce4f76ae0eb36fcb4b9129a40456a1823506dfa0bd7b0f389ea2908397be4165f4e7d4463e0c1317d25d43e20e94970eb914eee9e30f754ff7d345f7a766ad7aa9aa12b277e3cb41b0754f780050947a56e6d139f860c53ad282a26c41cf9ecc7abbc27f4e8a3539d756bd431bdc48ad7011faeff136e5b32346b14f52eccaa9f91d2be9190aea13f0e46ee674aee4b75c654c3d512ec668b201c695b0bdff90aced971ba53a466d82626e723a5ea97f3b86d380ac31b60816f4fe83794c527a791bc4f12b0f78f7fdaf01e0df6cd7e073b34fe844fbbcefe5ea115198f387efab51f59ba1b8553c7e91ad8627b58f7f4abfb21487a3d99dce435649222f1a8a567451e4182cfafdab6405681bdb58d5f19a05e7d2428d1748aca81c1c72652c256193f0b1d0332d5f3342a8f714056a3f8ed267def40b5f78aeda8f8af17a3f93a92a9000d59be0aab56fb19e5933bf7e991963d73425", 0x1000}, {&(0x7f0000001500)="373f2dfa4a2c358f0609843a868d765957c2d00197225cd7f49c981e798ca6ce8fde14e9d156591684f6f5cabef69d60a5e5b2afb5c0b3aa40228eeb4434af2b4305e4a55199db704fed877bb48196aa1e3deca0c378d0156472134498421bafacf561caaafc38cf2eeb8ade3c0ae55b25597c92019355c82af9bd539cb9d233c888ba24370c166ebe27b5b18c8019b08d79c9e70307da0a3e0589cee068", 0x9e}, {&(0x7f00000015c0)="cbfd6f1a6c424a0e261b432e8414dc94398b35a7c63da4deaee89c9971b089a998f9ef883a6017c944e199d3cb9e732628706eaeb61837444c1037ec30ddbe7c68e97b6d8ae1a94e9b62a43a9d6643977a0b79512182f283b201c944aa644c91b9f968b9010ff54827174700701176423c96ce7c80321530c3859373253007ddef8111668c", 0x85}], 0x4, &(0x7f000000c440)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x1ff}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}, @dstopts_2292={{0xa0, 0x29, 0x4, {0x2, 0x10, '\x00', [@calipso={0x7, 0x40, {0x0, 0xe, 0x5, 0x7, [0x6, 0x7a, 0x9, 0x6, 0x6, 0x7b7, 0x1000]}}, @calipso={0x7, 0x28, {0x3, 0x8, 0x1, 0x8, [0x4, 0x81, 0x0, 0x1]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @pad1]}}}, @dstopts={{0x20, 0x29, 0x37, {0x3a, 0x0, '\x00', [@ra={0x5, 0x2, 0x2}]}}}], 0x100}}, {{&(0x7f00000017c0)={0xa, 0x4e22, 0xc0, @empty, 0x400}, 0x1c, &(0x7f0000001a40)=[{&(0x7f0000001800)="10567b1a3e82df463e36c878b0f57226e33fcf3b63cbb7a9bf29a7ef56f315cbba58d14c447813600e86deb021e202960abd61939721b2698804d0cffbedb0000e3f9e89b9b5b0c5bf1bf85d5a080dd3e50566736bc18a44a41d79fab74993bed63e3b4108e0bc8db9a92603a796d4d79bdffcc6ef0f69b4ad95523daa9c14dc1b6aa55f491dba925faefbfaa1e1c505e194b8c1d25872afd404867ca61adc98fc27b30baefac4793b8fed", 0xab}, {&(0x7f00000018c0)}, {&(0x7f0000001900)}, {&(0x7f0000001940)="c46b3993f6a77f1fa8f9842934ec2bda7992e13dd03ea0a4543786b62e82d4db2ce05bfbe761a4acc915282f2cd277d5243f27b808b1a3ffd2329229b4eae0662fbff67d5c26fc07eea5f1a3", 0x4c}, {&(0x7f00000019c0)="db16b7e146fee28838b704c150338c0bfdb0e9a11d32defa4148c55ae53a28d812571277ad0b8ad4a327252100559994dc329f9e6ddca0887105e90dfb545d591b66cbea3b24ad", 0x47}], 0x5, &(0x7f00000078c0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x5c, 0x4, 0x2, 0xfb, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x2}}, @rthdr={{0x98, 0x29, 0x39, {0x4, 0x10, 0x0, 0x7, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2, @loopback, @loopback, @empty, @dev={0xfe, 0x80, '\x00', 0x43}, @private2={0xfc, 0x2, '\x00', 0x1}]}}}, @tclass={{0x14}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x0, 0x2, '\x00', [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo, @ra={0x5, 0x2, 0x9}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x2d}}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x100}}, @pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r5}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x11, 0x6, 0x0, 0x9, 0x0, [@empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}], 0x1f8}}, {{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000001cc0)="24e48253c78158019faacf3aa8fd3d2867bb0b", 0x13}, {&(0x7f0000001d00)="9b6318b9c1b0af93eda0f23c0c51cdbb1209297c22c642a80847bc0601bf5fe7242c155333a71ffbb68725228f20809f3a7e5e6dd32a5a1c8e68b8fb3a453e67b2b4888d17f048e71d96e4251de5c8be519d7d6517387029d1443c8b4433022619f963e6f9ce81367f0830344d5092afc11c2125a70e93f755001d89526686338ad3cd5b1d14eb5c3c8f442beed12387d89c9bbb85873e97c117e0606de31c11", 0xa0}, {&(0x7f0000001dc0)="4f4df5d508659e7dc18e62e64dece848dd978ca680221467f63ecefe0c6d8269298e800b310127cdb040b2eac2e76c601158ce4511316466e22d251ec2a980ba5976a55609f21c504e3aa968178e374ea4743a0d8e984e491e4b55bac5b8559e67ac3fd1", 0x64}, {&(0x7f0000001e40)="027112f625d53c416ac345a826926e64751c9f1d4aee9b88334525c35433a783b7962f935a2dea1fae960eb523cadd8e370e9411821cbf5dc07cc2", 0x3b}, {&(0x7f0000001e80)="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", 0x1000}, {&(0x7f0000002e80)="6ebabf8b265b7907e574d00a", 0xc}, {&(0x7f0000002ec0)="a9c6b76d707c4b1f25d783a24b500653d9d8d0b9bbc1e40da13d2a34c350e0063697898bc064da0d43b2a3b7363a2b3e3b54160984e2253ae14425b5540d5a61a2a34589f8ef7d170fb710b0df9d787cffc66b5f276e180d491f67b2ebe57b8c0a6c80195345851256077007b6912790eaacbfe9828f58b85c7aebe1845406d264579e01962ba779725c11", 0x8b}, {&(0x7f0000002f80)="74ad3c6675e30218fa99303cf82884b15f315619be163613a3b2133d251e8ad7fa7d8f795f3032c10aec3d1c966c14fca8b6dcc99fcef7c3ef99d9c5cfb118f30520cf8ed173c562184ce5ba2eda99f6ae45a7d4cf4062fd9a19c0f58871dfe855be76ffb431764c6d3a19cb2104a6117a1859e76dc8ec226c516979199b20585f71aaf1aee4c811b43a8f1dfd70901616016f9dbb977fcbc1c905f2480e87c534d8aae1fa0e654c15b6daebe7ab1611cfab8a29614cca6e264cffd45b4e1c4bb1cf6dfc6f6d4d08e669dd48c9b19912ce708633", 0xd4}, {&(0x7f0000003080)="c605b612a7c8b441aef6f84d6e65b2ab335ceeb69eec3b16192077f2ef9ac3d414c53ba71e84330288cdf95c35b13413831d27992a67ea1772e2e4570a217b069c2196b0dc96db8c65f4a37f9c111b3776827d9b5046278267d9b15ab0cc057e2de43817f0d6f17378930095ef35e6d53fa84bccf86a83c4277b76d810f293d52fa654e85e9a84ed108b54cd667fbb0d19037e63e56e10fb356d2750591067", 0x9f}], 0x9, &(0x7f00000032c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote}}}, @pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, r6}}}, @hopopts={{0xc8, 0x29, 0x36, {0x62, 0x16, '\x00', [@generic={0xc9, 0xab, "51259a9a08a15d2b2777020d5aa304a65c6c0220e17fbc3a1d13db1945e9ec7225e82d3273a566c91ad75b962469e0e998280b4061eb14029f66a74956eddb8e84d3a6f33cdc8c0522b52c90d6f926168541a0a05956227642575bcc08f81ea6fa4fa680ccd4d8415de96f9da2bea923919a2ddfa9da468890eee2abc26949e91eaa6ab5178f82c107f1fe0fffb56560bd88d8850b57fcb9a9f8c35d199a4e94d7e541b203d15b457a4bf7"}, @pad1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3cc71afe}}], 0x130}}, {{&(0x7f0000003400)={0xa, 0x4e22, 0x7, @empty, 0x8}, 0x1c, &(0x7f0000005700)=[{&(0x7f0000003440)="6e8c7db6cfb0cb16bc8904f8e7f6b2fda0b0894229597cbf5c0c9d5a93beeeaceaae75cabe184d6122e24214b5f53428dd7569860a87be41ddfa67629480182fe3c99a70e2466ae68f2379814680e5ee02c18c1950149786cd41e525ceb5366dc2870dd50ede7751a64c0fc5bf288b814d450831f19ed3b8293ed27b2b18a0d64404ee6da74f4ed9983c4b645239fa5f0e8ae55f732b3c1c8b87056d3445ede2852d54c38dcc474e7bdb1af023f22d576b0c0f0bb20afa7776a85b735956007415cb8f090fefd4bc127ecbd130b7003e6d75b16198bdac3e7771476e15da21eab3f8dd6e625a128c603636d3e31373a82d0967044e2fa452450fc8bde83a1c2cc2fdc9fa91cd6579b327bd14852af0c27e7fa7b52c522e676702b18660c1a80cae6db5086f0e9294af32fd10d327be839b20944a09676419598d66063c316b0c39cf093eb6b0dca7a0787f547320d4e5956385a78ae6c4cecbfd3375b6b3a735471229dbaad2530db613d8fb5e9ed6451495823788963c8ae2a20dfed9187830770eec77a34ec19f45f2dca44db3279a2f52e89abecceae8e23a9a778bc93b08bab18f8bbbe02e5cfd0a44408b472106276e19c7e875fa79c22042e40bfa4ec37bd4ecf9a4db163bd961bd5d13c0fd49cb03a71e8de296c8f9ef0ad0f3e6e49115669cc7e6da5d4c98cd94bdb06d36edf3ab178368b2019359340f7731cc83104becb28b95e95d83fc2056504ed71cc7ee2c46b3183c381b9142a97e1c762800c234e40772b42ab473bfff6a305885062648bb4ae054504597808e438b1e1f16b78ceca7c7c2830cf7ff03bd3f10e9485a2dc4b50e7f866d882798b5a1b60242711319555856fc8057d0f61b6c68b148e5d15453352691af19536d6cb94d4ac1f3895f4150d5f85e6d24b7c3f40d4156a5e094f7ff628f9f9aac55712465e20b63cac3cae029b2790c5cbbe0f870b83eca47cbe0a05266fc9ee33012f6c1b5e48e354328a65fc6a1c5d1e5010c967c9b088406de9877934079abdce876b397424eb9704e6edbbc2f0445535c09ee46f21cfac610f322f7e9d49e3ac8039d50bb1a486ea450af007c6e7425326a5e23ee1c5bf765959061d32c5794afa64f4c32937e3555a3edf84a995d13da361cb5967673957dc41ef2a125ba2d1444514338fe03b61ea5f2e1b07bce547157fec74c1f1e913bd76b15c91bbfbdecf85b3cab452328558273f93994463b1ddf917880c219c845a787bd6483085756dd14755fb69bdac461c8bb41e21764409478d1e6e188d469a8b4ef52ecd32bf3f45f197a26ae1f4ba8db0930181901c892f94b776ee8724eb0a4f77e7740d172949fa6ff51f42375b2f45f1c0f77de8eb0cd06ca79106dccbfe2eaa843d3cfbe1a85c7f3a9f5fcaa2c5916d832564f299b9d4ec79536532f1a58c49e6a9ebcde2645f600a4ac8681f0227ff5f418dec51025a47829341057194a29c29db158302db8219fc309549b40accc3a34e9b4a770a49918353a9dc33839b5f239a42e07c01aaecafd123b7b58226b8b6fb978de827a3e37e415871fd0a6863ae58a45853eda0f1238d2a9272434ef11e971100cc414232bd78cd74091ba8f8b7c3dc4589408913bb5a6203bf9d13b3123827387af631a9ba771e6ba19b20d52c1705bef5fb38e8872ce2f9b2c2cc0e651ef916a04dda773a8ea632dcb2f489257b0cfa27f943cbd8b873dcaa4ad254f4f6d5c3dda45e88bd1a647589c44a379707de398dcfb8ef953d952bda2b84057cdfb97c4cb5bdb6cd43eedfb0cbcf8b08587c8748f7ea8b19159013458cdd1d1fa257fb44fde84c1476f8c26d4561e1ed8242bd586c50932ad6d5cb6b7dfecef9482b265c7aa542a24cae7ec12d3ec46e511d22b5b07e7e7d2a6880b9ef469b9378d0038f5060ccac5c3222f9e4f0c4029a9817c7bd236597f53b9d7cfd123f4ae0abdb0e362c82b6e30373fb785081b687d21b75b1046b7aa0de17a2d8a0529e89017fb74499e07ae4a24e559ec7361eb5096b8d8f39c189f5e908badfa62892016e2b2ed2700ada60309060741f5dca60fdc89c64188ed97d140e6a1c468dcd993ceae33f815fed653cce4526211a857a6c4395250a59e27ac6aa92157858691d4bd7810ade270812842fb72910a2c2af8ee8b23e5d6011bf38995d616ec10c987505a6ddaf6169a03a7b2d94f4b4811cc971354f5ded5b56ae53e1a34732d95b7b3dca28d8f82431a3a1c98a1882fc36441ccea8e9dfe1f2174134629ac1f9c353b6ec8aacf7d1e26d5a3636393d358f46b277eeb07b0764c4413511e440059086e91a1204b608d8faad322f994c0a6073aeb6905018c34c2cc77ec84c03c041d25925bf4297cf147d01ab4e27d3fcd1697d81523139b1aeac67c08c578e21a642e1933172a802d267e613233354714669b208cfc3a397f502a2d3af653de4db61ba09eea6c60796f11d2a1304fe51a9eeb62b7c533caa5f68ec6b68e93352acb2d739d6ceb4d100d66835b2eaa47f7ecc31d2b9e35553eb1c36e2733775c1cbc63f269cb597feb7f2154c41fa944c19829cfeea998819ed8ce4b60fe9e9ab66d0a72593d81b07cfcc38283beaee3ab794f90d83186e35c95d8ddd4d8f8562a5a280d28c5fa723d0c1d81cf3fd932a765a9caec715b60d61f5a2d7034348ef8d7a9bb0502ac4f2003731969703c1d2584def557aa53f8cdea4661b30ee82843586c0195bd2f26561cafde4bd9caa64dd648819943dbfb227a526f0e1d9cb4ccce4e8cdf22eed95f3d1a64cb1405a18b9ce0aaec6970aad3e7fd4d335528e452d1167f825528a869b690e2b34311bb5c6e6d76b1e5a1176d5be93f5da6593875329960ab56cde115c9dce8b329ef7f85c183066739858aaca198147dbeb7cb5dd99eb1442c4cdc5947b7cbb01c0f1d6bf8452934f2b9f0502c65c2192dfb82d88f475dc704a76ed46bbd21ae72a7f6417aa75cc2ffdba85ce6a5e4da08453fb769f1603dbaa1080b9e904a6fde05234f19e54cf2fec61566c6a2f498bc4fa3b9f8bf16a5e288f6647dd2337cbc7d455a90ebfdb1e4d861ba05428d4edd9ed1d4d9618082e62d97130806de033b3eab8c8425578f33bc4f48cb2ff508f8f867db8845112b69c0f922f71db5d2a2f0f5a938f5cc78e6d36525a3506c8310145eaafa2e82cb37c9fe3a7eba2046c715ceeb8cbc808584e25d6a362e7c67737f16d98100c96bda61925e3e759d21dae5264f0c0aae84bff2e7ccdb45e4ae2b0c0ae3b4dbb61d92b9b3b12a03ca47b305cb32f9fa2bae7e65cb2c8475f2c103fb5cd48798e413a152325f61fe07f369121621c4f2ff22facf4c65633273af41a7d1c16eee45c9ae4cecb5c269011384503c2b7b861dfe730fe0b9cf0db87de63b22dfb20c4f184c7db295871b66134200113ce2c7aec03d6326ce32c932321b5733b36503443a3294545e7d88c54cfcc0494b236939b209ca892debe5dbb7fb926905b5924d1c8aa5f95c654cff34e12aa0cc8553318287c996197c248eea0730e9cc52f3fbcf2535f36898bdbadcbf2d39e388f0852c1e3097e880e06d2f2ff05827588d523db5aa38791a157a553219cded22039a0c47d6840cb0ad84babe8fb2f59d99ead072985125e64011f9b3cd98a6c45ec7208e3d8d9aaf78361f7097589d49797c81d626cf82bd672835d3bf57cb42fe49c9b4b8c08d49a15bad4da18848ba259e56f0dce415414be59d9ec02c934574557e4e39f88e4ed6e7bfca50ad16ca2ccb494b4f6827709abed48c04a61b25dc4041d13ccddefa4a35930fc5d8a1843f8fb267ab37928c5377a4d91198ae5bc2c64316dbf13b046262ce923b78b23c83a6f35411d628bd3654b9bd1fe182eb01854be3a00cbffe5ae5bb8485e3988c9bf8130a7d2d14ebb0a14a684d8b79b84fa5dfa787f0f9aa260b977a9101124409726c5ab643a0ef5ee3a96dda7cdd4caf1d85f905f304a9101d724e99f55632332e03cc41f87b29658026abb338eaea6a11d0a3d7bef57552c3220d127792d5462affe98d770c55cfbffd353e83e45ac9fe0163349105b139ce9bb5e999d9cc0b69242b4716fe03e7c2369373f0955369a95d49d7a9bf5b26f911aaa8a4e16efb92e73801ea2391181e9bc59683a710f6da49af177ced9c635cc2cfe9d92eb30aefe193039c2fdd013d9ea626e69c9384628a82b4109ac40003b94cabd2079ca08b75900390b3a40575e61ece67f3395a82190334cba53675b33bf5dfff938f3a19d1c9953593db656d27bc95c1c6603a5b3676314c60de1ee3bca29c01f17dfc8ad874fce56e816f730758c4dd257c7dbb7c37e3e32f86ca16df3bd7e0316f9acca72bf2615850a944ff9def667aa963b6b5cd635a759fb850875794808adee53a3606973f57b3302f835047f6ff835a73492f8176f8ecc3feeeed8e66db72ac07b3ac9caeac1a2c8e00b582d7bbdc6618b0faaf54c6ab87a181c545688e2e3e391bf69afd90ff6d1fadde424f6940361b2124c59c999bc7388e321d33cc208d77b1707f9a3954c5982f8126b41b2cfdd4a4995491e5d038af8a402e6fa0c132da526766ca52e6aa9da179793f177cf11fdaae8991df8a8cc44037cbe5321f04a3cd696c5c3c40f44a40409cfa2570cf7bea0e97732fde10f87dec94374606efedc3e2aec3d8b456c3bccd3a4a5cb34340a1b36537e9d0e33d0543d07619a923710f8e0d0ca165db84d3fe1d5acb33f4e6af4737b260b23665c9848087f316a277c133fb7846254102b8d4e30e38da83c5e1bdf690ea7dbec7aa15515a3a08f6c7cdff72216557cf6c6cc86a6bb28b8f3201b89fa058bc389fdd9aaad909ee0a6ae5f1f22a7e2c2bae4c34fe3053f9400eddf3b49072e3c3902dc056d524af6a3505af9cd1f2695ac46dcdb6018e961e8edbe502854b7222614e191a0080279521ffebb05295cd936f43fe31c4c3096a8f232a10262679dfbb484a1e5aae130fd957dc99ac23f7a92889d6ba73f528f94e52e4e659f99f9cb619291acaae2f5fb10feeaac750311baf9fa3d230caca69796f77f34987d8b70f0f68a042e6fd3fb9d0a54419dcef46ca5cd4abc3b0732c3d754359b24216181679b2fdb0e9064cc6af447cca8ec5205d215f4647e72e71d9eef27f5c566508fda454d5d58b35655b39dea3641259f1c6206ef277d6b8c472feb1e2a1a7306daea843a99cdb4d57365df41af7f10100373ccc0124826da4c038494c67ca367db305e1b5880e3833771575330b43a31246e075b656587f23b364862595beb56849b2fc3392743a9dd23a7793ae9f78012316d1f0d6dce73f461caf3f77fe1c6e15348867c0f301438686be27a02693998d9a8a99879ae42f30fe1c793348ea30375aa60a869383a0aabed27f1fadbe38cc3840de36f6ac03044a6480909889e1a6f0ce1273f2fca5bce1d64145303176598988a8b8bed81c1a685a3623a469b3870228badde2b417faa6e1a095f33661595715ad2221b88237d447b8aca89fbe9d4ab6968c4dd71b35bb9db65810ac28c5cbdf9f3288cf75060e9f158d35f697f60af0e50b21f929d3000cbd830782b540adc59e75cfd033077e94a67aaa2767c9bbbc54f43a25e466f333c1928d0b383587e9efed6392fe15340c061d89016abc5b32cff05e4e46f1b2d7a78bec8d22d5111c67e61d036d9e8bd918eb6ad817dfbdc0aafac4e75225370ed9bda42acabb4a32b9baba331021793a4e9a83e924c64df160bd37041934df9bee6b9ca3af9e0411a8991cb2117b90c157ca", 0x1000}, {&(0x7f0000004440)="86e653405e5d8ccd02f0fbb6155d2cf924a42192d57c5d8cc8e6f1fc67be10", 0x1f}, {&(0x7f0000004480)="a7e356cccdb274f70107591a4d913d5ebc9baf06dc026adf8c3b99358fed7a8372e05b52806992257e0f09dec44f5d411de76157b6518bacaee63e30c8bc382e6b218530c88846ab53b8f17c7cc0f4cbb5b4957f4d369e175abfff9a20992ff3ab76877b1b96e34bfa5e3540ca85892902043c22acfed258728f18f89509dd8a5dbe7a22c9ed38f4d87118777ac88b2b4da9a6a823c145a294794ebb5a3cca19bbb843", 0xa3}, {&(0x7f0000004540)="ca92a6d109ed6a0f53abbfe52d6769a78a6e8376a4f321ddd09cffbbc7f3eeab2596ad46923d9630043b0347b83d5ab77ebb0530ad2005ec619a", 0x3a}, {&(0x7f0000004580)="d4ba854cf3236ff74294f33657d6291d469dd2eab13072b532cc412d", 0x1c}, {&(0x7f00000045c0)="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", 0x1000}, {&(0x7f00000055c0)="2834f720c89748e9176b317e9e6cb2b97c85511b60f915c99a0affec84f1345be1bb60c9a0ec75bf334a", 0x2a}, {&(0x7f0000005600)="311864ad54e262f8e073b09e24cea481b08c7f20a10bef8a9885f8b713db2fb7b13ba70049ee8d0181c58a393639bd592796277a67a3fb14e9c705332d5abeb268045ae0e62cfd6fff8724fc26b73775b2503e5188b633182ec63f104b7cb927ff844ddacf6c851fa9b87e023d39a314b0a62f951bc5a6f0f1422bd66f03c9209fe654685593ce381401edbb52ef0279400bf0d7efe15d373c5ba4ec06d1643e3ff268498c33a58e2e82b0db1d7d8df83ae442ce77d13598f22d0701bae5d3d15fd40d5537359c", 0xc7}], 0x8, &(0x7f0000005780)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0xa56}}, @hoplimit={{0x14, 0x29, 0x34, 0x9}}, @tclass={{0x14, 0x29, 0x43, 0x1}}], 0x48}}, {{&(0x7f0000005800)={0xa, 0x4e21, 0x800000, @dev={0xfe, 0x80, '\x00', 0x21}, 0x1ff}, 0x1c, &(0x7f000000bf40)=[{&(0x7f0000005840)="5d718921736ab1437fe7bef50f9e40b4036b2ee4c3541ed6cacd6ff2da82cf0cd13263cf72cce540922960a2905aa1f8026b331b24d0d15aaab0f9d4b26f86659764ebe63fbd715b4da6e3a9ec0706bdf7a9eff4d6e7e366e5e8b10e9884728b17cf31526a5c9cf13a2b8fd7ab562c8f2d7b0c7c3b23b5ef1b68bc92", 0x7c}, {&(0x7f00000058c0)="823ba1ef7d5960dabf84e9e3c5b3781ceb08877bc96d4f238e8f09ac6e7910a05d57", 0x22}, {&(0x7f00000016c0)="8efe12a62bb4490f36959db2c1a581720c722d3c37dc0a559077", 0x1a}, {&(0x7f0000005940)="f356012471a719ad0480a7276cbf1f1971fe7fd07aeb6e94a55d0e78ef7a840e63f7b7e1ec4adf007a9d1e72c8e4098922c6256361e26f32f78f07a77f6d6e85d347665931654553e00016d5da12c41b950b701f18ac0a2a90dd39e5858de941", 0x60}, {&(0x7f00000059c0)="7df721003c26822553563ac6db6d5b0bf99b01dd615ac1a88ba8c6d377a1d7e6d4a05623760aa90e9d4c7a85521b5520412078d125ed92586920517243bfdb0759833cc6c8ddc824be37a9412f997fbdd18bfea7e1c4c315cf626a08bee52d47233c6ca37d1cea811db3735c4095c886a5d3c77dba98d2abcae6a677aabbf07f244d36508bfe09339375375794cd472258e087c8d944e20f4e47e0196ce9a405bfe6429ac25785c3d492b5caf174a3fd31ba8c6cc09ef5c3d3fedcc3e93911e4d339cf7f3dcdba5ffb34426a8687a403a8b9db2b3d37b6f8c35eceb56ec761b98e", 0xe1}, {&(0x7f0000009040)="11b9b1222e8cbe668189a00d4848d71aa96793d8fba378adf2f05c9973c28139a5463e819cc42dcc964788095a1edc1b9343c65a4cb55ec5422eb0ff5e8012b83bfae49784d147ba5b959d0c5cdb56305e3873b0", 0x54}, {&(0x7f000000ac00)="782ac032e8f4e0e9e812246f20fd6ed1a52b11aade645f6485ea246bb9efed78b258697b0dfa62f6713e4ed880c5f5f9ac83d2aef3705c1bbf95ed2441cbbab2707bda7bbde574bde0e312920ee145d9924dc2273958579902744781e7e76c3861d71ed0f7441d39e64506cb6678503a71b86e2b881452eafae0f9c892f09f6030c1a83c1fc55de6be61ec7bfdf36a", 0x8f}, {&(0x7f000000acc0)="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", 0xfd}, {&(0x7f000000adc0)="c32596c11f55092a89a464585a8399a1831b1cc6484d7aebe3b691177abc92b0e2deb3c8a192fb50c071169a4002981301a643d1d6781f990c61acab03a3612c035b8431d0a0a084ceb6e1e75363b089ef73afbe51fdca456f4988077c254f7ffca81b4f383bc9ec13a7725022dfcbbfe352fd5bdb9dc6bbfabff33a3ed51532dd436b3808", 0x85}, {&(0x7f000000ae80)="b07c76e6ff6efb2466df5ef101c260b7c9f5fd12ca2b17deb07515e053712a18897aeabfbff3ec3918d7a236123ef042bb7cb8697f48eafda71a02c892683882b31a2cc926c7cf9102f84d0e0de2cd1278b075c24274a146026666d5e8ab35578c202c88b35a7a0ddc101ca400946dd2df272a67f9f02fc08428385efe8ad1d179dc25613534375301800b0b7e00381bbc", 0x91}, {&(0x7f000000af40)="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", 0x1000}], 0xb, &(0x7f0000005b40)=[@dontfrag={{0x14}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1000}}, @hopopts_2292={{0xe8, 0x29, 0x36, {0xc, 0x19, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x3, 0x9, [0x3, 0x8001, 0x9, 0x72ce, 0x80]}}, @calipso={0x7, 0x28, {0x3, 0x8, 0x40, 0x400, [0x1, 0x8, 0x3, 0x7f]}}, @hao={0xc9, 0x10, @remote}, @calipso={0x7, 0x48, {0x2, 0x10, 0xff, 0x6, [0x8, 0x9334, 0x4, 0x8119, 0xc99955c, 0x6, 0x80000000, 0xff]}}, @calipso={0x7, 0x10, {0x2, 0x2, 0x9, 0x100, [0x3]}}]}}}], 0x118}}, {{&(0x7f0000005c80)={0xa, 0x4e20, 0x40, @loopback, 0x9}, 0x1c, &(0x7f0000005cc0)}}, {{&(0x7f0000005d00)={0xa, 0x4e20, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x101}, 0x1c, &(0x7f0000006240)=[{&(0x7f0000005d40)="34f7c75f88e93c33709b9299ff58a23201ba5f07df8747ec8d6011905bf03a6e2cbbea25f21f17b68948d0fcde527f319c5041573afc92fa9addf5ae69966cc45a69e3e48704723c41dc39014ddd08390d1036513a4bff090432c0b542f3c8a7455b8d7a2b1c737a18c55628a47406ca89b035318247caccaa18d3e46d02", 0x7e}, {&(0x7f0000005dc0)="37fe8e87971dc82784931693b45221967d77972d165d23f9e2541fe8cf9e618e8c932ceb92eaf2fd3643d10e4bd8d4f26e180c21fd858ee96c296b27164cbd28bbe85503b7f7abe00443e75dfca1084aa3cd7df90162cbd9614730e8a684f03d7e9cb386b77eebf0d08395f2c1c0891c9519537aec0107b374525585346797d1268933a9294e2d8fe267949f3be427cc6a48535d921ccfa9a7f32766467bfa128882394cc29695336e797d79fff6fa556e55ad7c78e2eb483e12c2718150b1eb29bd01f630c065f976a0dee77a7a3ffd2ae920b141636d718346c089f1e0b0f2e9", 0xe1}, {&(0x7f0000005ec0)="f043c268d2e82f7da4ac57543371a23b512e2bfcb5b052a6b1a0aff233e6b11d5575e8a33f106bd161e1cad13118a5f34bea7f7d1b6e7967ebd61977e63e2578c452aada260281c22bb3187fd6c02198bf2b42d99f0770707fa324c5d0105fc019cd8b9db344204764e0d7b18cb3a239e659ee55b4592158019bfd80a5ab61b5c9a509591ddbbbc450", 0x89}, {&(0x7f0000005f80)="090f6df5ed0cee5c4a3df687f313d87eb2ab6dca6b89f3abcd801381013babad003badd2ebe801fe3380882d4f014c2e808681906b34d4d6abf71aed85f9faefe44976a2684ffd110a7c0ef6dedf1f6f2bcc582c6678e2e25d2f7da4637eaebc643a13a45ad9fc55e35aeb43eaf8af37c589720aed74d309031d45192b23e26a52f11afbd0ddd1227a63431fb712d9123f5863c15307b873cdb28ea426e33dff338a21aeb0500f", 0xa7}, {&(0x7f0000006040)="79013d263c34b4159fa965882c5bb71dbc566f25e42aad38787177ce56dc9bdc44748bd2f9730d51ec3d0c39440730c8abe5764a2dd5fa0292a68be578a37097b12293c1c20eaf1a3a3956af8072e8cbedd6ab23317bf73dd87712ed9eecae3cc48b62b2279b3b35fbffe0df09249f1b4c425fc8064796bfcd6a50f9735fd439a82acdbe646796553f65c997c805411ade85ce584ceffbfe8083f2370e351edcdfc0717637788c97d02e21533fce949f6fd0b667fbb4897f46442d6d2c5735b3b5b10cfa50d44598e33cf38869dfbc77fa262811c51a7f19e60426bd1e7bfc2a838c9426366aed8b3ddd916611", 0xed}, {&(0x7f0000006140)="dc4215b2674768ecd4dba43e50f785902310f5d7ce66bd3481526e1649856677d5f47c7d24661dd5c7e00cd3f9afa278a6ae372018cd6521c169b43a3729c4ca59e821e2272de5b08c3d6c3836f9b8826e5d86253c61bcac20e71c7389b7b3db6913045d92f427540d8624d52c9ce16132d9acc59b18b91db59dc9bdc8c4ee2ffff03f7a32fe5b5cceba2b22b9a92c108ccbe6848dd757f580e638db9726a4f5800c0aa46ff01a388f25beb7ed7d5f6373e020ccd8f29a5cb34a28fc902b11d9a0305a801d4088f98dbd3a10af8a0b8b2662e48fe5ae60f64ab1ce2018f9d74834b6edb7a85010f36bcf25f4869c5f45a54928744045a000", 0xf8}], 0x6, &(0x7f00000062c0)=[@rthdr={{0x48, 0x29, 0x39, {0x0, 0x6, 0x3, 0x5, 0x0, [@private1, @mcast1, @loopback]}}}], 0x48}}], 0x7, 0x4080) 23:36:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xfc00}, 0x1c) 23:36:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) 23:36:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xf5ffffff}, 0x1c) [ 2495.110123] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:36:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_debug_messages', 0x22902, 0x0) sendfile(r3, r3, 0x0, 0x3) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0xfffffffd, @ipv4={'\x00', '\xff\xff', @loopback}, 0xffffffff}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) 23:36:47 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="50010000290000002bbd7000fcdbdf2516000000fd00580008091a5ab7cec2b29e20627469ab93536f4161f6122e8fd23fd2271e81ae85d766ca1b83c374db64ba566de4ba84e36f361e451583761656d93b4a480ccf0eac25f2db4ae9817394a2cc6f264cbe010d73697c0002e9ac583f7ba979a47880db1376692f2ada235ae91d116791d505e38e75f1c231da3dd2ddb74f7ad74cfe64d0007221e9f0549e80f88adc5b10fce48a8873b90416c355da73e795330e12d99c127dcad9adeb7b14330d9000d548f2df3cc6838244e34a0a8e01680252999c76d74f5faddf0405bec3fdbe311e3eff8d09cfb04ebbaf62612105a53635bf3fde9b991e8690cc294dccc63c82be1ddc51e02744", @ANYRES32=r0, @ANYBLOB="0c003400060000000000000029268819bc0c45f9098120be80f4e3e352927cbea17d1dc3ce341181d50073fc3d625bb22400000042671399ccb82cda74d249026d5717e324dbd3dccd1f2663bbcb32a30c852b5595227215d3c1383b0d775b0d448554bf27eaa6276934d81a791d5ac1396d099d"], 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x24, 0x0, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}]]}, 0x24}}, 0x40) read(r2, &(0x7f0000000100)=""/188, 0xbc) r4 = socket$inet(0x2, 0x80000, 0x80000000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @window={0x3, 0x0, 0x4}, @mss={0x2, 0xffffffff}, @timestamp, @mss={0x2, 0x3f}, @window={0x3, 0x0, 0x2}, @mss={0x2, 0x5}, @sack_perm], 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) syz_open_dev$vcsa(&(0x7f0000000240), 0x7, 0x4a4061) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000c, 0x40010, r1, 0x0) 23:36:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xfe80}, 0x1c) 23:36:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x4000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, 0x8080, 0x1}, 0x0) r6 = syz_io_uring_complete(r3) clock_gettime(0x0, &(0x7f0000000400)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000006300)=@IORING_OP_CLOSE={0x13, 0x3}, 0x3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) ppoll(&(0x7f0000001bc0)=[{0xffffffffffffffff, 0x384}, {r5, 0x80}, {r0, 0x200}, {r6, 0x4409}, {r5, 0x1022}, {0xffffffffffffffff, 0x120}, {0xffffffffffffffff, 0x8000}, {r2, 0xb2e059b0a724e8e9}, {0xffffffffffffffff, 0x1000}], 0x9, &(0x7f0000001c80)={r8, r9+60000000}, &(0x7f0000001cc0)={[0x800]}, 0x8) 23:36:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xfc000000}, 0x1c) 23:36:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000280)="000000000000000000000000e7e1fc40a6de4c28a224ed4d77d18465a15c3fa1b2", 0x21, 0x4e0}], 0x0, &(0x7f0000014100)) [ 2495.275931] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2495.293853] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2495.299449] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2495.316497] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 23:36:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) VM DIAGNOSIS: 23:41:56 Registers: info registers vcpu 0 RAX=ffffffff83e5b5a0 RBX=0000000000000000 RCX=ffffffff83e4365c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e5bba8 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff856725c8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5b5ae RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fdb852c3000 CR3=000000000feba000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004191246120000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e5b5a0 RBX=0000000000000001 RCX=ffffffff83e4365c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e5bba8 RBP=ffffed100112e000 RSP=ffff88800897fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff856725c8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5b5ae RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007faecff94010 CR3=000000000feba000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00de02fe016c6c6f502e726567616e61 XMM02=20726f747563657865110a0100010101 XMM03=7420636578650b007374726174736572 XMM04=696e696d20636578650d006567616972 XMM05=6873616d7320636578650a00657a696d XMM06=78650a00736465657320636578650a00 XMM07=66206365786509006c61746f74206365 XMM08=650b00737472617473657220726f7475 XMM09=636578650d0065676169727420636578 XMM10=20636578650a00657a696d696e696d20 XMM11=6465657320636578650a006873616d73 XMM12=6509006c61746f7420636578650a0073 XMM13=6320636578650e007a7a756620636578 XMM14=6820636578650a006574616469646e61 XMM15=00006e65672063657865080073746e69