dc53800098034000080060001000200000008000200ac1414bb0500030001000000060001000200000008000200ac14142a050003000300000008000700ff030000060006004e240000"], 0x1c0}, 0x1, 0x0, 0x0, 0x20000004}, 0xc000) r5 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_io_uring_submit(r6, r7, &(0x7f0000000100)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x40000100}, 0xffffffff) io_uring_enter(r5, 0x76d3, 0x0, 0x0, 0x0, 0x0) [ 257.417783] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 14:44:42 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 257.427687] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 257.430704] EXT4-fs (loop3): re-mounted. Opts: (null) [ 257.435666] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 257.439201] EXT4-fs (loop3): re-mounted. Opts: (null) [ 257.459115] EXT4-fs (loop3): re-mounted. Opts: (null) [ 257.461271] EXT4-fs (loop3): re-mounted. Opts: (null) 14:44:42 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r5, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) 14:44:42 executing program 1: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r5, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) 14:44:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x300) 14:44:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x44020, 0x0) [ 257.548243] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 14:44:42 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r5, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) 14:44:42 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:44:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x44020, 0x0) [ 257.707094] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 257.712382] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 257.731448] EXT4-fs (loop3): re-mounted. Opts: (null) [ 257.735709] EXT4-fs (loop3): re-mounted. Opts: (null) [ 257.756328] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 257.767772] EXT4-fs (loop4): re-mounted. Opts: (null) [ 257.772629] EXT4-fs (loop4): re-mounted. Opts: (null) 14:44:54 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000470008000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000a40)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat2(r1, &(0x7f00000000c0)='./file1\x00', 0x0, 0x1300) chdir(&(0x7f0000000040)='./file0\x00') renameat2(r0, &(0x7f0000000140)='./file1\x00', r0, &(0x7f0000000180)='./file0\x00', 0x2) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) 14:44:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33373631313835303700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040000c00000000000000d6f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000003800000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010500)="ff010000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d6f4655fd6f4655fd6f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030000000", 0x40, 0x1800}, {&(0x7f0000010f00)="20000000681d5748681d574800000000d6f4655f00"/32, 0x20, 0x1880}, {&(0x7f0000011000)="8081000000180000d6f4655fd6f4655fd6f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000500000000200000004000000520000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d6f4655f00"/160, 0xa0, 0x1c00}, {&(0x7f0000011100)="8081000000180000d6f4655fd6f4655fd6f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000600000000200000004000000620000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d6f4655f00"/160, 0xa0, 0x2000}, {&(0x7f0000011200)="c0410000002c0000d6f4655fd6f4655fd6f4655f00000000000002002000000000000800000000000af301000400000000000000000000000b00000040000000", 0x40, 0x3c00}, {&(0x7f0000011300)="20000000000000000000000000000000d6f4655f000000000000000000000000000002ea00"/64, 0x40, 0x3c80}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001002000000000000800010000000af301000400000000000000000000000200000070000000000000000000000000000000000000000000000000000000000000000000000000000000ba8b7ff700000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000", 0xa0, 0x4400}, {&(0x7f0000011600)="ffa1000026000000d7f4655fd7f4655fd7f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3337363131383530372f66696c65302f66696c6530000000000000000000000000000000000000000000008cbe886300000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000", 0xa0, 0x4800}, {&(0x7f0000011700)="ed8100000a000000d7f4655fd7f4655fd7f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008d33368e00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x4c00}, {&(0x7f0000011800)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d7f4655fd7f4655fd7f4655f00000000000002002000000000000800010000000af30100040000000000000000000000090000008000000000000000000000000000000000000000000000000000000000000000000000000000000072b2bc0c00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000", 0xc0, 0x4fe0}, {&(0x7f0000011900)="ed81000064000000d7f4655fd7f4655fd7f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c0ac393e100000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x5400}, {&(0x7f0000011a00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x57c0}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0xc000}, {&(0x7f0000011c00)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x10000}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x10400}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x10800}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x10c00}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x11000}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0x11400}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0x11800}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0x11c00}, {&(0x7f0000012400)="00000000000400"/32, 0x20, 0x12000}, {&(0x7f0000012500)="00000000000400"/32, 0x20, 0x12400}, {&(0x7f0000012600)="00000000000400"/32, 0x20, 0x12800}, {&(0x7f0000012700)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x14000}, {&(0x7f0000012800)="0200"/32, 0x20, 0x14400}, {&(0x7f0000012900)="0300"/32, 0x20, 0x14800}, {&(0x7f0000012a00)="0400"/32, 0x20, 0x14c00}, {&(0x7f0000012b00)="0500"/32, 0x20, 0x15000}, {&(0x7f0000012c00)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x15400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x18000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x18400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x18800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x18c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x19000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x19400}, {&(0x7f0000013300)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x1c000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="83b2ef02de5c20ce2d6c49dd8d555ec47a08e357d00b7b7bf9b170e8370140b21bca84fbbe000000"]) 14:44:54 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="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"]) 14:44:54 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) 14:44:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x44020, 0x0) 14:44:54 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) syncfs(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 14:44:54 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:44:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001600017fffffff000000000002"], 0x2c}}, 0x0) recvmmsg(r0, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x2, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r2, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x100, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xff, 0x8}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x40c84}, 0x800) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000900)={{r3}, 0x0, 0x12, @inherit={0x58, &(0x7f0000000280)={0x0, 0x2, 0x4ed, 0x8b82, {0xe, 0x3ff, 0x6, 0xffffffffd77c2e29, 0x80}, [0x80000000, 0xa9]}}, @subvolid=0x120000000000000}) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r4, 0x0, 0x0) unlinkat(r4, &(0x7f0000000200)='./file0\x00', 0x0) [ 269.805656] audit: type=1326 audit(1628347494.475:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5039 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 14:44:54 executing program 0: r0 = open(0x0, 0x80000, 0x140) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000000)={@local, @local}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000200)=@x25={0x9, @remote}, 0x80, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000280)=""/139, 0x8b}], 0x2, &(0x7f0000000380)=""/140, 0x8c}, 0x40010101) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='=\x00\x00\x00', @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0c009900fdc100005a000000"], 0x28}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f00000004c0)) [ 269.902611] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 14:44:54 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:44:54 executing program 3: r0 = epoll_create(0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0xa0000019}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r2, 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0100000000000003ff07545e35056fe594bcfdb779f509b968511590666bbd27270b772b97557211b3c931c1f37c985f4940d69421db6064e0a456ecc71205c6f427b0b1db86395094fa88b3f16409be5f206a9d7cd4ba91981478084a664d970d055924fb55d01e98f408dbdd940b0551ec619b293b94fa1e70ab846543f4b3cc42a84a4612a4333f0daa8e8e25b6d1b8a14d89a961ff64f7c0290649b04c1a36", 0xa1, 0x800}, {&(0x7f0000000180)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES64, @ANYRESHEX=r2]) getdents64(r3, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r3, 0xc0109428, &(0x7f0000000000)={0x2, 0x20}) [ 269.955579] EXT4-fs (loop4): re-mounted. Opts: (null) [ 269.957594] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 269.963849] EXT4-fs (loop4): re-mounted. Opts: (null) 14:44:54 executing program 2: memfd_create(&(0x7f0000000000)='\x00', 0x0) r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) pwritev2(r0, &(0x7f0000001580)=[{&(0x7f0000000080)="fa", 0xfffffdef}], 0x1, 0x6, 0x0, 0x4) finit_module(r0, 0x0, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10, 0x80800) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f00000015c0)={0x6b3, 0x9, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) copy_file_range(r0, &(0x7f0000000040)=0x10001, r0, 0x0, 0xffffffffffffffff, 0x0) 14:44:54 executing program 0: r0 = open(0x0, 0x80000, 0x140) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000000)={@local, @local}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000200)=@x25={0x9, @remote}, 0x80, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000280)=""/139, 0x8b}], 0x2, &(0x7f0000000380)=""/140, 0x8c}, 0x40010101) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='=\x00\x00\x00', @ANYBLOB, @ANYRES32=r2, @ANYBLOB="0c009900fdc100005a000000"], 0x28}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f00000004c0)) 14:44:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x44020, 0x0) [ 270.086703] audit: type=1400 audit(1628347494.756:15): avc: denied { block_suspend } for pid=5072 comm="syz-executor.3" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 14:44:54 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000280)="014344303031", 0x6, 0x8000}, {&(0x7f0000000140)="83498a5790b4224dc015fc0f93ca76c3315eeeee043d1df0a6a70d8cd81da3963cb25bfaaafcdf2983dff7b735cd065fa0eda7ef6b6c875ae50d2d3f53076fbdabf13397e580a2b54b93b2abf7af6c035a7378093d0710692cc8b19785d19c0548af6274af1beb893a0add6994cb064fae1af29ee418beda99c054c141d8faaa252fe7b18e944be932ed4194180e12612ad5b43163eebb8765c18623c1b3b2acfb42a32403779c264aa774b0688f079101ea8998348cff9ea1bb2f7b1703d8b76bb024de5a", 0xc5, 0x8800}], 0x0, &(0x7f0000000040)={[], [{@dont_measure}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fork() r2 = getpgrp(0x0) sendmsg$unix(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x40}, 0x0) r3 = syz_open_procfs(r1, &(0x7f0000001440)='net/icmp6\x00') wait4(r2, &(0x7f0000001400), 0x2, &(0x7f0000001480)) preadv(r3, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r4, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r3, 0xf502, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000001380)='$\x00', &(0x7f00000013c0)='./file0/file0\x00', r4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000240)='./file0\x00', 0x7, 0x1, &(0x7f00000012c0)=[{&(0x7f00000002c0)="49ff346bd59fa71acd82ebf4fbbe3f18ef13be2c4a4fc91f6b81d7f3478dce0f4e3a7e2a5b617bc95daeabe683857ac679a718d3acc011e48e52759f8774fd75e0fb1efa72fb86032af7521e292289af0785f7221fdea952fca81bcd67af7a494f1a9fdc3a49e8ea5fe0cf2beb2b1ec53421543e7be713f1d036d01948586a5f85c0700de92e2695bf99872a4dd0fea011f34ad9173c519bd8cd41e82229d5a809c716d92be1d4495f556fffaa5eb3de5fa994ccab5b73fd4aa71928fbd9aa9d4f25d8d5571846c36479143904fe1e1cc5b1069c591c55ace63eebe3183392057b799faeaa9f9074bd7e3b4476f433304679c5d2dc055a0c340c6387a4130fb93c83abe6b442010504a07750f1c93e18de22887e41cd7aac91ef3354cbf09bac370fa23d5435998da3aa7fa0a238f4cc514abb3fa46aa4305579e934e75669313150423cabb1f3bc7b49ca974c579ff29de56724cbdf01c25b20ecf28a323c4cfaf08191bf41f961c56922fe196ecf9ce8e37595d1d0524d43f72000cb83e20b505fa49ec9d278c7131df7e61658ec34d649f2cefcd73364b3af3f2e37daa91c44a830fc3411e74e7a015120e0d95fa3af686703811b4d40d0ba3b7c2ce9b2bb4d1c5485004340f39f00f3acdaa7d15a0a52804b4d60564ed4cda6dceb9c83f0b8cafab6ffcecb70986f79f6c082c75e0bca27baa14883a9339818fc9838360c2af09ef5ba8e93ee581e3f50c8382c1dcc9dad809be6a5f0c18c0638d6148bf2cb8b1dca2266d1f248b83adac97b592ab4c9108dc6ed69268d414c3ad01e50f8a508b56c6482c52d68f24f29cf535be5971c768811f52aa81755c6e050f325e9f1d1513dc472facf454614e7b1c94b2b60b91dcce1896065e29c5d6a8be77e1ed7670ed1f64c9ab0fbefdea38545495bb36933515fdab6071a89bd7e5a13cdcc30f44464c982db5e5c05ce6851c089b0a13bca4fdbde63e3f796cfb9cf5b23aebe4f44a24d6905ac219fe527a74baee6dda25bd06d1334102a70193b054507571b7b606a7a74f615e75bf7f3ace93c95e303a311f25169a43ed9579b20962bd02522a3539b7591e2fea297c25b4c1696b5bebd4a502d8bde9671463b2a73d67b43a5720598e1aa0a69d5c60a36f43050a4d22777e67812b731349b530d5c81d4a45377ba2c566227a5c886c22f034e96716bdb9171bf8efa39cb79f33dde0c976943032bca13fb2f498ea5b7aa8f0b030c7a50920a3f1e8cbf789be0d84c76833a02f672017b16030f613c00a37fb3cf6893a7b23b9b7def29e524c5faee777bacf5a5de0353973150e52109d5fa066bb297180f44cb45367e48f8589a8d0d84a123cd8a91d53f284d1994e8279ff70c9234e416729fb749a4419fb0aa8a56ff46814124a2e6db482e21563093f179dda00d495c41aed8a9c4268a2ecd5606803d1300d823daa0e4a690f938757f3ada398d26256fe9b6619c3a1fc3ab0d0864b20a44bd8d90202ade891e21e2fccde1cec3f0c065ef307ed70fb2b1a7b9e4e91b9e882745b2e8aa26aa2a5cd5d5ba8c9fcc0d1903afff95bfbdc51ffa661079871060952005ade618781b422c69fcd83516c49e117003bcbb4fc77ccb3682d78f2a4573f8db326744fa52655b31772a4c4a90bd606ba1a3455c9c0d1ef37858d81eff0b3501c8e5e1790ff31955d40e98237db7d32dfbae8716c571fdfbe3f83d03d5dd813f9b8a7d9330aa21e6b86d3dbfefae13f23a21c5aa831fcfa6becf73a105db630c4fb23882e425f6f4e5096979d3a0fe59edf5d1eba0b04361bea9d1e47213de1d0c34af938fdcef5706a7bc0863dcb686bd977b754ac993982ef92a7e2f738f7495d7018261c70f5af3e5070edab1d1c2a14b9af8c42366e953e95c2e2e6b345b0417dace035e9be34ec8edbeb07b78af5627837e464af300a6e0af4220a98e9492fe37577f206b11fcc638445ab1c2abe343585eb446b503e43f7da81b5d7fbb7a6d92815afd70fc8726a9b6a12beb0b92639be04d60c1dc061c7ec405bd14c293466ccb1ecb116d8aeac3b3b071cac3fb02b05b6c4cd225ec3d529b4e47cacf5c453d2dce700009fff0728e95df1ca0cc5b02197309f69869f3703432f1292af54a8302aa269f837527621a544176e0fc79985c48df146d6f92fe0f57d6f3958a3edaf3f575aa49cc7041eaf4b7df23548b7da7eb2a69fcdba8ca8992f5b1f5af0bb10f5d72698ba4c02d0e94a21346bd3a19a0330b5165593a6749327d97ac0acf6cf0285815e0c7f3f6a68a701a0c05c93e64fdd1b5a1648cdced97d3551894fdb87db6bbca2edbdf6dd5688f9244f62f38561b2b2d7476afd17c02e842e3d5c2cd7680964283e4b2036e68814cb039517c443301b755e6a2c531dee7ded4b5b90dc53d23357c69a5e88bdd086d1457530432ea193121e611fa2448d07678aa137bcc9d99b5cefe2254163960b7ce8b189404a999a782e08e1ab7018ebb4e071155557ecf3b6ec3b53e00f2925ccbce3ba61f0fc91a17dc4e45622689423fc5def2a7506134e87c07b57bc62b04ef441255a064f2718e410a7416c775f67baed11fad520d1022691968b937a5e7ec1774b5342f2d18275a186232eaf7ae62f9f6bcfec52a00376fc3b33aea31d685a2dcba0ca16cb9d38a98d869ba698d2641b45cce41ec28bb4921943fc94d5a13b00f7202474953f827055d9d49f704281cf7b29a1e2a8521597ebdac2ed4aae32e70bb929ae680956c41e131da9cdd50c7142080a3cee5061dd36175ac579735fc393754103123db5c19e808356b9dff128eaa8352562b2de81f5655d60b7b5abc03722f13539c9a0e7cca7073b91c323b1d9aef021a962ea98945bbe3ec994eb1a3f2a2b540ac418a417a43bd0654f0123b07c5ea2036a4029f01f5d4f14d3d4176395ff422872126cea204c391fa6134823f231165fb707eb4980af6e416c2d6b1eb93b749a57915d94e9aaa61cfdd369a76605bceb08d4fbd33b67461d8aadc915205ddda9770c96ed20b10dec761c47ccfaf824cb58644cc82cc20998de2b2be5c47f8abe8046413aa26357a43091e611fcf74b0d4f8b95414f23f5c3dc1623698e5a66f90df5bc0c8f029c680b5b39b60e3eaafc7478963e76ba1f4a9e21906791d5158704a92f9c0f849026f2b32b4b6ed0fdb5fffbbcaee5098c7b0942f4be5c5ae80caa2dcba9c593d18ee501d8979f3c556d7814d11ea32f1bf695583b862cdf1b9707cd16ebb23a3c1c04f07bf692fc5eabc15e773cd574c2a1aab43166df2df1c411db6fdc44ac54b69f751bc42d7f9a9f185437be5dc647b608679c987e9bdb8e8dbfe986b9998b1321ed32b066962f2b7682f54da402c072c9e18dcb9862a76e68cdc94205a3fb6a09e88cf39a26711c314777fea983714ce0c73191d34a2f4daf790b8e34a4216153bb4d16cae5408cd521dcccde2cc1c665a7ed4964efd8cd82f111b87ffe9eebf37b81f345e0fa6a6ffa20efbb321004c22926da8024fa48351e061cda1d42f1bea9776d4ba0a7914b96c27398a46a315203ba4b7fe3763d48605196738479cf0cd8ce1e504ef34a124219a66cb2de8fc1dc1d81b13da46ec44c22e43c5cfcf10316aa438059cd7bf8e4f33e4687a3af7bc883e147961e9c6192ecf7c02c3ea2a2d3aed99bf490a4a2a3d0c529a5640a526fac4eb552a9644ff010deb599580ad9ba413b9890453e7916543544e853200e4c1c6cebbaa0f3342aaa998984781f83fd920a2a4a6601ae92cdd89f44b8cf4e114c22f2dc5ee32e9e31a83ad2a3175038fb33d2e999d6459ac28c3d92e59d9ebec9f6523f7f982e32c6c6678439cf99df4f535f21dad1a27ed44d2fb60c2989bc80a251138a7166f6e741a0b91e961109f621d2b4e052bc71d622eed3b6111cda9f4bdcd65f37d78cd164d6e0589ad34815a742bae0c5c8edb1a0ba794855e530324c68b738014fce5ea8a9091ad9db0b821bc06c3a18e75a8aa99e5b978b12a38e3c2895d0c215187102c2d6bea6629703f2c2355c0e981e31d2014ca747f597820b3483f13ad26e4d96690b34491c3b074b7b1ac01179111ec3fdd18fed6315306e1aa4375d0b8002166f810458107a42af593a666241bb67701e4c3612c3b55461281c0e87ed1e6f1284f3fb584459e579928d7b6747564c8f7e8298ab8efcd169dfae6827962f217c25b8b6077ad17f209c815af62b13707ad9380703a127aae7b5f68043af6bb0d9e11b20060216b02ad8c23fbbb8eee580d51205ff6d52abc96bf1f29fdbb8000ad7004509cc59f15a212d632459b459af91a8b6ce42c0918a971b8873b6da96319f59554bc16723783d6321980b60be09dac90ded02f1e60240baa46f26ed7754c6e14d46348a00c9dcc0371c68d78c19a72d1800aa1ce273d63872947ee9b4a5568b1ba410b3b5e24a27de138cfc04ba49378b061529bcc8891f89846dac054b10fac292f41d58c0c7e81020320ece48ae13207010a45b8a4577d6c8053eb3279c4cfee8e6729ef065b8c0a12bbdd398b7e8fe5dc7e098aadc3be1bb5758350218c69d7255d0386a0a24ece13dea64766478e8b453873e5aeb3d749f10c5ad09ff41478af14321c5222c083ed66d44501e99da6e275e39a2f737a56e59ea9720638839663858867eb305d8383a9e443dadbc9dd3c896505389a0c58167207ac133cb68409d8223e0ac61fd3ae28b17b5e7ab72ef085219749bb7e4989ee2b26ec2e95f2ee70913b8c7211d50e10d1066287cf26a20c3c5eda02bf81ea93a4c62fa0fc7fb58cfb4253ec6fe3b72309a6f1eaee0f0d453002e9982391dd1db94bdb364116601a7457d24b32860dee855a396b875d5467249716698ba3548b301812f5cb9930724972dcf91766ee63710b4744384e480688dc38456f3a31f79443c93fc321a98cf3c13b59c5d5adc662c32d3a8b40097963e431e3171e8714000c3f768d0f92ea636979541afc64a7845bb4635541b3055a449e130a3e54d357fd94419f21ec81cc7cc20629eecc4a67a05b2fc23b85309c2561d2b2d6e675c0a79f663b418b537c6ecd4e4a6e094e79b43f93adf19683879e9d72cb59ca6a36508d117a184f5b87cf246cb739d7784639770c8e8cc7182d28fbab9b0e918f107e7766d86cec4121df70b035051c302e9de1ba0ce0abbea4a4b40b73ab516186239b873faa25807cb3d81cb1a348e9fd56f76c1412467e7b98637d9225f4e563d1c84e40eaa6f474c16419db5131cd4ccb8ae376d63aff9a87d563225f5589aec774f8fe7a5a8365ad7fb526a709f24239d742f0257344587b5233f10bb06d1b14d2d963bb81df066f62b2e61a3e73f88aee727e8f1ad8a207c0f6c19a4f4fdafe208451e3a9dcf460a02a1e1dfa310de37b24277ba0f50b79408022df644f9a882dc407e89988b63dc7afa0c6b58cbd27ee2ef18179ff392a21a5973c7b641e18a8540c5d05c9a0dac05df5b8c09eb0383a2bb75d8d33f5b7429ec39dd881eb4c71faa3f112507f1858582f1eb876d3eb59414414f651475a7a7c084c7724dc42da973f15b9cdfcae6bd4df22d402dde49d53b52f304718c66f56653b91740fe9858d5f0382d7ba070a7452a035c6ebc6589874e2f6e3534fc4249ac6e5d6937c6b87622b623641ee734547da825f309fb162070cbf8b854e45a24604c4c23d1e6f1858513fe89c2bc785bafefa35c7557f5a37b823a5771cd9ed563aa56f8b0b7fb90baf02634b7f00d85daffdc15b214259d399ea31b92ca60f6450158e75d6", 0x1000, 0x101}], 0x5018, &(0x7f0000001300)) 14:44:54 executing program 7: r0 = semget(0x1, 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRESHEX=r2], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x0) 14:44:54 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) [ 270.146379] audit: type=1400 audit(1628347494.810:16): avc: denied { module_load } for pid=5071 comm="syz-executor.2" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=1099 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=system permissive=1 [ 270.149607] Module has invalid ELF structures [ 270.188607] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 270.214068] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 270.232535] EXT4-fs (loop4): re-mounted. Opts: (null) [ 270.237063] EXT4-fs (loop4): re-mounted. Opts: (null) [ 270.435426] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 270.621673] audit: type=1326 audit(1628347495.291:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5039 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 14:45:06 executing program 3: r0 = epoll_create(0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0xa0000019}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r2, 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000280)="0100000000000003ff07545e35056fe594bcfdb779f509b968511590666bbd27270b772b97557211b3c931c1f37c985f4940d69421db6064e0a456ecc71205c6f427b0b1db86395094fa88b3f16409be5f206a9d7cd4ba91981478084a664d970d055924fb55d01e98f408dbdd940b0551ec619b293b94fa1e70ab846543f4b3cc42a84a4612a4333f0daa8e8e25b6d1b8a14d89a961ff64f7c0290649b04c1a36", 0xa1, 0x800}, {&(0x7f0000000180)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES64, @ANYRESHEX=r2]) getdents64(r3, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r3, 0xc0109428, &(0x7f0000000000)={0x2, 0x20}) 14:45:06 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) 14:45:06 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:45:06 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup2(r0, r0) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x10, 0x3fb, 0x10, 0x70bd2b, 0x25dfdbff, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x4001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fork() r5 = getpgrp(0x0) sendmsg$unix(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee01}}}], 0x40}, 0x0) r6 = dup(r0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f00000004c0)={0x1544, 0x31, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@generic="a4d97a00006e51058e6aa5e4e1f973c027568bc02a6a469d4bb6d4924025ed67681e6f03193a262f63760dc111c240a862623777f13b81c4177c184b504458127df8bbcd513b19f03e94dc95470fe8efa297140f01227e9260b4b4a484dad67938f1683e2b3c05d3d4df338aac05c4b088e3d9d19b7164dd6ebda6068a7b03a6949399f0f5c464315eb6e28159587aa3b65d8b98e1a331af8aef29780e84d7f5ea435e01380e88d1a3bceb0d2f0090c921eece18c4ebb545dc6ca68abe63d2604b035fd5a787072e54061a0abf61f6099a219af911a192cea8d1239141c275bee4dc64cce9ad5c6211c85d88582fdf22dea4f02eef4fc77447cdb2019a8aaa05797c7bb99b03cd9b86754d23e16ee2e9dac73546b3a03586dc76125c04298683b7dd221b8bf278af15ce9ace9d03c081f6b3f3fcef47ef975d7b1fbf6a5ff169c3495df68ead63d34282dffd857f36b7f4ee26ed3394fb1d7459622cd9dba9cde79a15d566dc6a0f403186f746fbed38c41e85d36c7100"/388, @nested={0x11cd, 0x5a, 0x0, 0x1, [@generic="172d", @generic="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", @typed={0x8, 0x8a, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x25, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @generic="5fbab9ebd3d7d720f53a5b6ff2013937e28527cb78350ec2437ea30c21e7c385d85dd521d2f5da6cd9ebb3befdb937daecfbb63ea11db18deb244c05fbe6c9b39e9bcad5a5448f17830ec5218b6bf957a509a176fbff81d3c27eb7c5ad006063d3a60afaf9799daaa09c08a87848d76132e2db5ba896fde6465858440bab96f0f99020722bb1c24668bb0927fc70afdcc0a19c3fe006fb06e21ea18c347666fe", @generic="0a19be3347ae90857457e4905d06653e80419b391c61be23b7a54b6b50d4d780566629d7650cd0c7a744fb85ae749106e5ea", @generic="69e4527041476238b6d689e2f190703fda50bdab33444b98d6b80333e1edda2653fad35fa8c617a6f5f0572a315cabe4834faea8e36dc602efe1143abae06c736d83d34c869d749151616c44b5ab94550699756053bd7abbeeb3c1ae4b55c568112ebbff7d00df050a64f76da0f99fe9a16ef2c99d5c25c47dcc20174ecd3d599fad815729f4f75681016e650712235ddc878d21175cc071767aaf5c68db91238c72883d0f20003c0ddfe4b6bae3f301f16ba9f537cb34637fc32978c324a0", @generic="a8622292347cd08575ea47f932d7a5efbdb17863ad0907", @generic="830409434e0aa681dd07537cbc1f82"]}, @generic="a6d3fbd5575ba1ef44c518ba54b48f02a8ee2f97094aa6b2078d9bb4f40678c277750884d37f5b77a58a86d1119c2594aa21c363c6acb1dfc4b67c3e4cd9d68bf81d8a7b4c60bee0b6c961e7b8f7eaa371b21915d13eef61edd6b249bcae540b6401c232ccba0391a8650c8d9b878a40022770da0776b497c505d741470802059aec606439ab3c3abd7976e6359312662e25496e77ee836330dddd308ba0b5a8367660a9c63e28e48cf8c8336700412e0d89bfd1e5607c0434b1a220c9b1ab6d808185485f5774562462be31d8fa09613f9f957ba84af14c86e0006f5478d0d6f235c7742fa41e7241695d80377c", @typed={0x8, 0xe, 0x0, 0x0, @uid}, @typed={0x8, 0x52, 0x0, 0x0, @fd=r6}, @typed={0xda, 0x1, 0x0, 0x0, @binary="732c8cccc01510b9572a7249a6411784ffdf30971e83534971eb1fc3f3f8764842fdb3c3f6a931c1118272191071714d98936d6b2171e98f5f474517e6e9c259babf5a537987c3e3aa663afec3edbd3ff293e4c5a06993063b443ecaa5a6a5cb0891708961ae5faa8ce6456c709faeb67fccf17ac214ce6729aef390b6c527e6061cc613c3c7505b86d069edacf051c42c645ac3d40773a2d6736cfed0c3f3adac27bee1ab1575b0c715471b54d08803bb46bb7fcc8e9652c2f2d058cc8f8a35d8b0f7525f3e8a5d2bb9830af45fcd230f3cd3c457b7"}]}, 0x1544}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002780)={0x18, 0x68, 0xc21, 0x0, 0x0, {}, [@typed={0x4, 0x31}]}, 0x18}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fork() r9 = getpgrp(0x0) sendmsg$unix(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c, 0x1, 0x2, {r8, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0x0, 0xee01}}}], 0x40}, 0x0) move_pages(0x0, 0x3, &(0x7f00000003c0)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil], &(0x7f0000000400)=[0x6, 0x1000, 0x9, 0x3, 0x80000000, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) r11 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r11, 0x0, 0x0) kcmp(r9, r9, 0x5, r2, r11) rt_tgsigqueueinfo(r9, r10, 0xc, &(0x7f0000000180)={0x70, 0x5, 0x9}) 14:45:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x3}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000009c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000b80)={0x28, r1, 0x509, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x28}}, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 14:45:06 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) 14:45:06 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) syncfs(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) [ 281.893823] audit: type=1326 audit(1628347506.563:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5119 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 14:45:06 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 281.945421] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 281.983099] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 282.015772] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 14:45:06 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) [ 282.134236] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 14:45:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000040)='./file1\x00', 0x100, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TIPC_NL_LINK_GET(r2, 0x0, 0x4c8c0) sendfile(r2, r0, 0x0, 0x7ffffffc) 14:45:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:06 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) 14:45:06 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) [ 282.416470] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=33608 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 [ 282.462528] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 282.479731] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=50422 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 [ 282.493037] EXT4-fs (loop4): re-mounted. Opts: (null) [ 282.501483] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 282.570657] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=18432 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 [ 282.671472] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=89 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 [ 282.674283] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=143 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 [ 282.677042] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=179 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 [ 282.679788] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=224 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 [ 282.685473] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=84 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 [ 282.688356] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=109 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 [ 282.692614] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5164 comm=syz-executor.3 14:45:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000040)='./file1\x00', 0x100, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TIPC_NL_LINK_GET(r2, 0x0, 0x4c8c0) sendfile(r2, r0, 0x0, 0x7ffffffc) 14:45:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:20 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:45:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r5, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) ioctl$SG_NEXT_CMD_LEN(r5, 0x2283, &(0x7f0000000080)=0xa3) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:45:20 executing program 7: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) 14:45:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 14:45:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:20 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) 14:45:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 296.076643] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 296.108052] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 296.119324] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 14:45:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 296.260500] selinux_netlink_send: 16 callbacks suppressed [ 296.260517] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=33608 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 14:45:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:20 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:45:20 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000a40)='./file0\x00', &(0x7f0000000000), 0x8000, &(0x7f0000000b80)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:traceroute_exec_t:s0\x00', 0x27, 0x3) 14:45:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 296.430238] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=50422 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 [ 296.445706] SELinux: security_context_str_to_sid(staff_u) failed for (dev tmpfs, type tmpfs) errno=-22 14:45:21 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r5, 0xffffffffffffffff, 0x0) [ 296.474179] SELinux: security_context_str_to_sid(staff_u) failed for (dev tmpfs, type tmpfs) errno=-22 14:45:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 296.505167] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 296.575258] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=18432 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 [ 296.683871] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 296.781737] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=89 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 [ 296.784734] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=143 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 [ 296.787620] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=179 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 [ 296.790454] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=224 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 [ 296.819910] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=84 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 [ 296.822847] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=109 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 [ 296.835031] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5203 comm=syz-executor.3 14:45:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:32 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000a40)='./file0\x00', &(0x7f0000000000), 0x8000, &(0x7f0000000b80)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:traceroute_exec_t:s0\x00', 0x27, 0x3) 14:45:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2, 0x8, 0x0, 0xfffff001, 0x2, @rand_addr=' \x01\x00', @empty, 0x700, 0x80, 0xfa55, 0x1}}) sendmmsg$inet(r0, &(0x7f0000002c40)=[{{&(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001880)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@empty}]}]}}}], 0x20}}], 0x1, 0x0) 14:45:32 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:45:32 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:45:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:32 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fc00002}]}) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14, 0x180000) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000001c0)={0x0, 0x0, r1, 0x9}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) r3 = creat(&(0x7f0000000200)='./file0\x00', 0x20) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue0\x00'}) io_uring_setup(0x3de1, &(0x7f0000000680)) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r5, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r3, 0x89f9, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', r2, 0x29, 0x0, 0x0, 0xf2, 0x39, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x20, 0x700, 0x6, 0x6}}) connect$packet(r5, &(0x7f0000000540)={0x11, 0x15, r6, 0x1, 0x8, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3f}}, 0x14) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) write$sndseq(r4, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x200002dc) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f0000000600)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="8c040000", @ANYRESOCT, @ANYBLOB="100126bd7000fbdbdf250800000054000180080003000100000008000100", @ANYRES32=r6, @ANYBLOB="0800ffff4584e63f4552aa9a8656f65197efcc8a198d1f9cd8a32f95ff0cc6a1d9219774245dbafd83d57915ebe07552e4fcdf7969af25ca762612451878de32cb22a50beb146d1bca6d2ff6e903a1904b3b51ed0f8a96399ae38b97fae9db4708fe5b70c6915abd5b5ba7fe19ce4e977bcf915d586a8fd35b99", @ANYRES32=0x0, @ANYRESOCT=r5, @ANYRES32=0x0, @ANYBLOB="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"], 0x48c}, 0x1, 0x0, 0x0, 0x20044010}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @dev, @multicast1}, &(0x7f0000000440)=0xc) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'syztnl2\x00', r7, 0x4, 0x2, 0x37, 0x2a0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x7800, 0x80, 0x20, 0x451a}}) 14:45:32 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000440)={0x14, 0x1, {0x1, @struct={0x3ff, 0x8}, r1, 0x5, 0x6, 0x100000001, 0x80, 0x8, 0x402, @struct={0x4, 0x7ff}, 0xd59, 0x4010000, [0x4, 0x2, 0xfffffffffffffc00, 0x0, 0xa3c, 0x4]}, {0x1, @struct={0x3, 0xe7c3}, 0x0, 0x8000, 0xfffffffffffffbff, 0x4, 0x6, 0x1, 0x429, @usage=0x6, 0xba7d, 0x5e, [0xfffffffffffff928, 0x6, 0x3, 0x9, 0xc000000000000000, 0x1f]}, {0x6, @usage=0xffff, 0x0, 0x9, 0x3, 0x7ff, 0x5, 0x2, 0x10, @usage=0x6, 0x3, 0xffff, [0x8, 0x100000001, 0x3, 0x8000, 0xc192, 0x765]}, {0x7fff, 0x0, 0x1}}) ioctl$KDGKBDIACR(r0, 0x4b30, &(0x7f0000000000)=""/42) 14:45:32 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 308.015431] SELinux: security_context_str_to_sid(staff_u) failed for (dev tmpfs, type tmpfs) errno=-22 [ 308.024324] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 14:45:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 308.054151] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 14:45:32 executing program 7: r0 = syz_io_uring_complete(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) socket$inet(0x2, 0xa, 0x300) r1 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r1, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x18e, &(0x7f0000000080)={@local, @broadcast, @val={@void, {0x8100, 0x3, 0x0, 0x1}}, {@ipv4={0x800, @dccp={{0x3a, 0x4, 0x1, 0x2, 0x17c, 0x68, 0x0, 0x1f, 0x21, 0x0, @empty, @multicast1, {[@rr={0x7, 0x23, 0x21, [@remote, @dev={0xac, 0x14, 0x14, 0x33}, @multicast1, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0xf}, @remote, @local, @empty]}, @timestamp_prespec={0x44, 0xc, 0x86, 0x3, 0x4, [{@broadcast, 0x101}]}, @timestamp_prespec={0x44, 0x14, 0x7e, 0x3, 0xd, [{@broadcast, 0x2}, {@remote, 0x43}]}, @timestamp_addr={0x44, 0x3c, 0xfc, 0x1, 0x2, [{@multicast2, 0x81}, {@dev={0xac, 0x14, 0x14, 0x32}, 0x1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1ff}, {@private=0xa010101}, {@empty, 0x8}, {@local, 0x9}, {@broadcast, 0x7}]}, @timestamp_prespec={0x44, 0x54, 0x66, 0x3, 0xf, [{@loopback, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}, {@dev={0xac, 0x14, 0x14, 0x29}, 0xfffffb9a}, {@broadcast, 0x8}, {@private=0xa010102, 0x7}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@rand_addr=0x64010100, 0x5}, {@rand_addr=0x64010101, 0x5}, {@dev={0xac, 0x14, 0x14, 0xd}, 0xfff}, {@loopback}]}]}}, {{0x4e23, 0x4e20, 0x4, 0x1, 0x8, 0x0, 0x0, 0x1, 0x7, "4cce74", 0x4, "7baa98"}, "a6153779c311f0158d1b094964c0bacebb90d342552eb312687f50a9353fc6d766ffddcd540c2522e39cb99a491cbac277c50af646177264411cef2980dbdc212b0a9559a917a80d8f3b28fc03c06af158f61c3dd1524dc353ace4db30b75b825ed166a5f7a35f9ab0cb5e657ceb7ac6aeb9ed0c5bca78e5e3629117c3bc072ef698c6c2"}}}}}, 0x0) 14:45:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f00000028c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100828, &(0x7f0000002ac0)={[{@init_itable_val}]}) 14:45:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xdc800, 0x1e, &(0x7f0000000200)=[{&(0x7f0000010000)="00000000000000000000000000000000000000000000000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000055aa", 0x60, 0x1a0}, {&(0x7f0000010100)="4244db8cf0c2db8cf0c2818000060003003501b800000800000020000004000000180000054344524f4d000000000000000000000000000000000000000000000000000000000000006b000060000000c00000010000000700000001000000000000000000000000000000000000000000000000000000000000000000000000000000006000018f000c00000000000000000000c000019b0018000000000000", 0xa0, 0x400}, {&(0x7f0000010200)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0x600}, {&(0x7f0000010400)="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"/1408, 0x580, 0x8000}, {&(0x7f0000010a00)="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"/1408, 0x580, 0x8800}, {&(0x7f0000011000)="ff43443030310100"/32, 0x20, 0x9000}, {&(0x7f0000011100)="01001c0000000100000005001d000000010046494c4530000000000000000000", 0x20, 0xa000}, {&(0x7f0000011200)="01000000001c0001000005000000001d000146494c4530000000000000000000", 0x20, 0xb000}, {&(0x7f0000011300)="01001e000000010000000a001f000000010000660069006c0065003000000000", 0x20, 0xc000}, {&(0x7f0000011400)="01000000001e000100000a000000001f000100660069006c0065003000000000", 0x20, 0xd000}, {&(0x7f0000011500)="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"/288, 0x120, 0xe000}, {&(0x7f0000011700)="22001d0000000000001d00080000000008007809140b2a3a0802000001000001010022001c0000000000001c00080000000008007809140b2a3a080200000100000101012a002c0000000000002c1a0400000000041a7809140b2a3a08000000010000010846494c45302e3b3100"/128, 0x80, 0xe800}, {&(0x7f0000011800)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030002c0021000000000000210a0000000000000a7809140b2a3a08000000010000010a00660069006c00650031002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c00650032002c00270000000000002728230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0xf000}, {&(0x7f0000011a00)="22001f0000000000001f00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101012c002c0000000000002c1a0400000000041a7809140b2a3a08000000010000010a00660069006c0065003000"/128, 0x80, 0xf800}, {&(0x7f0000011b00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x10000}, {&(0x7f0000011c00)='syzkallers\x00'/32, 0x20, 0x10800}, {&(0x7f0000011d00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x16000}, {&(0x7f0000012200)="000000000000000001000003000000000000000000000000000000000000000002000007000000300000002f00"/64, 0x40, 0xc8000}, {&(0x7f0000012300)="0000000000000000000000000000000000000000000000008000000000000000", 0x20, 0xc80e0}, {&(0x7f0000012400)="00000000000000000000000000000000000000000000000001f800f80078000e", 0x20, 0xc81e0}, {&(0x7f0000012500)="00000000000000000100000300000002000000030000000b000000010000000402000025000000600000005b00"/64, 0x40, 0xce000}, {&(0x7f0000012600)="000000000000000000000000000000000000000000000000f800000000000000", 0x20, 0xce0e0}, {&(0x7f0000012700)="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"/1216, 0x4c0, 0xce1e0}, {&(0x7f0000012c00)="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", 0x220, 0xce7e0}, {&(0x7f0000012f00)="00000000000000000000000000000000000000000000000041e1000000000000", 0x20, 0xcfbc0}, {&(0x7f0000013000)="000000000000000001000003000000000000000000000000000000000000000002000025000000100000000f00000000200000ff00"/64, 0x40, 0xda000}, {&(0x7f0000013100)="000000000000000000000000000000000000000000000000020a010000000000", 0x20, 0xda060}, {&(0x7f0000013200)="0000000000000000000000000000000000000000000000008000000000000000", 0x20, 0xda0e0}, {&(0x7f0000013300)="00000000000000000000000000000000000000000000000001f800f80078000e", 0x20, 0xda1e0}, {&(0x7f0000013400)="4244db8cf0c2db8cf0c2010000000003002401b800000800000020000004000000100194054344524f4d0000000000000000000000000000000000000000000000000000000000000005000060000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000c00000000000000000000c000000c0018000000000000", 0xa0, 0xdc000}], 0x0, &(0x7f0000013500)) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) fallocate(r1, 0x8, 0x0, 0x8000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) pwrite64(r0, &(0x7f0000000300)="af", 0xfffffeb2, 0x0) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="6a868a9657689b7cb5304b04f70d0804a1a12e8a8ad52257166ae425af19fecc8ce71514d4d938e530de7b1f7551622e3e9cf30972b8a06d0a6b429cdb3b09b8067c1eacacc1704194e327120bc6c1bfef9cef6eb057d20fa3fad9eb7c5d165d6192b68e980439b5caa8bab32483d806e8343180cc553c37840182aa6355ac399b7b8312034b601b4103808e184041dc7f9876ac1954cc0c", 0x98, 0x6}, {&(0x7f0000000500)="3dc3374fe245c8dac93d6ecc51a39b2dec06346a634e1c6ba88e74bc37635384d886b817fb73153569c4c7babdae4790e633beee520eb03deaa0eaff3e3376b3ad9b62413663b9922c92a6504d300099cecdc7d135b96a49c9095d3722c3ffc5a755d22e5fa2fc2b8c9c92e61f866f35318c40a482294845e3a9c496e946ae8c6c0a4004a369a45875b775630567c74ebf", 0x91, 0x9}], 0x3400000, &(0x7f00000005c0)={[{@shortname_mixed}, {@fat=@tz_utc}, {@uni_xlate}, {@shortname_mixed}, {@numtail}, {@numtail}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '+/'}}, {@fsuuid={'fsuuid', 0x3d, {[0x11e8306482c09ad2, 0x63, 0x5, 0x64, 0x32, 0x65, 0x62, 0x39], 0x2d, [0x61, 0x32, 0x32, 0x30], 0x2d, [0x0, 0x38, 0x39, 0x39], 0x2d, [0x39, 0x37, 0x39, 0x34], 0x2d, [0x31, 0x61, 0x64, 0x31, 0x38, 0x38, 0x62, 0x64]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '-^'}}]}) 14:45:32 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000003ac0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003140)=[{0x9}], 0x10}}], 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xa8, r2, 0x10, 0x70bd25, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xf12, 0x6c}}}}, [@chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x45f}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xff}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1590}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x138}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x3}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x15e0}], @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x39}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_CSA_C_OFFSETS_TX={0x8, 0xcd, [0x9, 0x7f]}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x6, 0xcd, [0x7fff]}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20040089}, 0x4000080) 14:45:32 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 308.178873] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 308.182518] EXT4-fs (loop4): re-mounted. Opts: (null) 14:45:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write(r0, &(0x7f0000000140)="b7", 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x20000, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0xffffffa1, 0x0) 14:45:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x18, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x1040004, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0xc2000258) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = fork() tkill(r1, 0x3a) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:45:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000002840), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000002900)={&(0x7f0000002800), 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x210, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x7fff}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0xc9}, @NL80211_ATTR_BSS_BASIC_RATES={0x7, 0x24, [{0x12}, {0x5}, {0x18, 0x1}]}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x7}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x5}, @chandef_params, @NL80211_ATTR_BEACON_INTERVAL={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x44) 14:45:45 executing program 0: fallocate(0xffffffffffffffff, 0x11, 0x0, 0x1000007ffe) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00') pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file2\x00', 0x177) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) 14:45:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x640, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101802, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x3, r1, 0xc}) 14:45:45 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:45:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:45 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 320.637474] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 14:45:45 executing program 1: r0 = io_uring_setup(0x5cc1, &(0x7f0000000100)={0x0, 0x0, 0x5, 0x1}) r1 = signalfd4(r0, &(0x7f0000000000)={[0x8dc0]}, 0x8, 0x800) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') syz_io_uring_setup(0x5f19, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x395}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) get_mempolicy(&(0x7f0000000540), &(0x7f0000000580), 0x1, &(0x7f0000ffa000/0x6000)=nil, 0x2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000640)='ns/net\x00') syz_genetlink_get_family_id$team(&(0x7f0000000880), 0xffffffffffffffff) [ 320.660141] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 320.664181] EXT4-fs (loop4): re-mounted. Opts: (null) 14:45:45 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:45:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000240)=@updsa={0x138, 0x18, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@multicast2}, {@in6=@private2}, @in=@empty}, [@algo_auth={0x48, 0x1, {{'blake2s-160\x00'}}}]}, 0x138}}, 0x0) r1 = signalfd(r0, &(0x7f0000000000)={[0x8]}, 0x8) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x300, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x24000810}, 0xc000) 14:45:45 executing program 7: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) fork() capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x1}) 14:45:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x18, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x1040004, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0xc2000258) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = fork() tkill(r1, 0x3a) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:45:45 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)={0x0, "59f924dc91933f9087ba994ca647300928fac92a94a9072343a5a65b9e1cc32816a16ce1bb981f536f490bbc9e6567fbada008ce47a5bab3ecfcff64813eae27"}, 0x48, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000001200)='encrypted\x00', &(0x7f0000001240)={'syz', 0x0}, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f00000000c0)='$\x00') add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) 14:45:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:45 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 320.821081] capability: warning: `syz-executor.7' uses 32-bit capabilities (legacy support in use) [ 320.839252] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. [ 320.848043] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. [ 320.882962] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 14:45:45 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 320.889796] EXT4-fs (loop4): re-mounted. Opts: (null) 14:45:45 executing program 4: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:45 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fcdbdf254500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000400000065000000"], 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:45:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 320.961257] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 14:45:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0x9, 0x1, 0x1, 0x82, @private0, @private2, 0x10, 0x10, 0xfff, 0x8}}) sendmsg(r0, &(0x7f0000001980)={&(0x7f0000000180)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x20}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000300)="2ab874e411d40329a691f1420de1b38358f4f580e034d174bee7b05bedd36e7cf991e8913fce52b4fa3a30459e26154f50afe53aaa69e5870457413a4a17d8db224fc2cca1259e8ee8f7aee55305ce5602a001c7f12e144b9f1c050af332913d21db1d3b290452666d76b21a02f58315c1228ea6e6d5a5aeb982431476fd9da554e7e03c4ef715d4ca4406bca6c30ca1731236184d5ad0096b8343f3c1d00518748c6f8641ab971d84d2642cefbd967d459f98244697ce1fc5d034e57f369f1f63960bd8f7847488", 0xc8}, {&(0x7f0000000400)="1afb0cb35d38bfbe8cc5be7bc7690f20acfd07704c9a10db9691bc5d818b613d6ab5d35fc74672e8bebd53e80f42f9be37a9aa5fd1b6d9a8aa1b4ba6d72eaf3e43f06487ad36d3965b50ed3bf66520fd997334a7fd708d45c15e029f6947b6916808b2af2c7150f6a62cc83830cebec571c851ec6738ce764dc16c86752d9c6bdfc7c3fb757f214e48648bd2b3302dea09b4b7ab239759b3230eaf34bb0740c3838de2feccb72402f0e9caab8899277bb62c0c2ebf172c76123a3db1ded2f1840b8d5e34bb2e1d3d256312d3ded01f18f13f60d51f5abe962f61da7546857b980758d4aa7ab310ce03f0cdf6a31c7f56d07cfebf628c4a4653742ff94f1a46c7dad1d1cbf0490ced3a647872365803a3e1775491462f5b03fb7149d6038c7e8a624721c0e2f1a676db18908103bf23013d07945f5978da93aed4f030b5f9edcf274d2ff8d4f9fd3e5604ccca02f1b11de611d78df0d6e0ff49d8deced8fb4ff6fb152e9c1f84cf4d2f5b9d338641249b76c60c86b8f2a363c06dc29584d5c2915fedfdb7c4e44433ec55bf599e04e1c6769bb48b252df305601c68b57845226ff7eb673a03178dda9357e023f2a3b89bb056fb5ff85e9fb541bf3c7ea5c2c96d19dc425b7e6ffc67217b1fc4b535142bce23653a570bf1e9df4b01a0bcd57e056cf70eb6d8bf5c85885d752515628a858c39e912cc56d14bf8074234641ace9959c6ff1480851bf12d281adeb2d25d5b3ed76f761fd82a483c327a4c3c7b5ebf4aa583f504586573515541524187cf714c324c39346f612db787b0ad05d62350f1fa9e12a5f911ffda45a20ff6852dd34f5eec4e5b6b05d535db7955b9bde7cb19f3c434c5b0946cc40853a538e81cfcf302857a36305f65deecb91fbfe77f8e514a26d4cd2bdb62211456d2d87d94f93b094cce6e9e8cef4e37fb97884e4225b7db2262c2f9c44e554d585e1a9943bce32c9364ab915c4e3896f7496ba93520a4630528d0485445e20af76c4d64873a356bc8aa934de54a298d0195f152a1f4f2911fdbb9785a3a4e6b1db5d1e9c088b923a2314e32737f943792312c55260e136e38b6c9f059c235c3b3cbcd8b9684c665f4bf2badfc2d2b6adaf8b1a35769e89d0c2ba53d1650ac4e06591d5c9350ffaa7aa24fc3ef95d52bcb88d7bd1fd7ca20dcc7ed453e641d857e54ca842df3ccf0ba019ff03f64730a3ef2293d4d08a4202add986758403aae4dafadbc60c9436d840b6420b48fdd0ddf5632b6727e4414c3686cdda73b7e6e6dbcdee3e9bc95e5aa804ca7be893611450cccc54dbc476a0121c86cdce3f31b02fe88396b28368e691338a3f90e27331c31596a8f3ed111c8b3e87bde8caad6c97d8b8f44ace6b1eabe1b74ac15b3a5a07c420ff5e72833228d8ed880d29fe8e7a099d319188fa61d4508ad7dba57b62096faf359b773215ea649dc0c07d7745b84d5e4f1d6640fcd311469a59a817142598e96f8af6108c1732e28141da84b2e902ec5cf258d4ed763369627f59baeefc22f9c61ff470d615262ac4878f24b50e0ea6242ab11b433a81dbe91376c60b9e26e981e86bacb043a86bae16c8d8ee8f1c587988be014974ab5c2b09473b5fb8a2b0c7baa6ec7638864ca9405e51f5f21de0228beb1904ef8d8cd0a5ec22e1c72930133dbb734f850795ea699cfd9203b91fa999d1a33b85d8cce4112be6c71bbbb7004851bfbc22ec3cc0fbd167ad9551975678241578cffe348e1bd7863f589640a1e96f60d85b7e9f6d6cd290a7878fad60930f07502912b1bc7ce0a9a806feedbf9d0f4b208df3fccfcd307af153b2f3daf3ce307860a37a52b449dcebdc62e0a05963a6a379e7969ae87a578de8fbe15d12e1b29b255c014723dabaae120e2cfb9c1b7ac2991dc90d17560b963c0abef241b23e93fb084d52cddaf857c7c361070561a4a6afc997680c7fa202b866d041de4ecaf8b30e883e70dd668879a951cf08029ed3f3c87cb135de3790e18e6be5c7b55e96ab34c545f6a30b1a737defedaf2df8e573b3e163227e44082e6f7c1f5ffcb71359740b9c21aa40dcc4a78df033ebd441050c5e50e7cc10c1c1f781c3948f39f07274f775cedcaf5d10c0b8bf4ab9604c0f9dc8a845f2be620d36c4ec7b47ba18dd25fa8800cdf6e16443e4792509bf296cafd08febaea0c9908a85a04305e5dc5418238da230724e06fa5be7b814eacba6e851632d51b674c495672b6ec4824295312267e622c46f5209eb4fcf9613eb7412d41e61126924a7af3fce74968d4f1313e5a4a282c814f5eb305a7983c818f888c91dc03510a0a526128e7d565e87b7e653e1101383c7ab91d66b47eedae22b958fca1905905f8b55f64427ece015176d3aec1ae0bd23c3db548bea489b73ccc5f95cc52b58091929921a9eba6123775f9cf4d9f879e22f17f1548afcbd0abbc52222550a98cff91d1116be452558ec613767a8231bc96472bf4c6a80f56286bf1e47d420d2a16af0e3449a53ce5fd98c6e7e9478d4858b4d49f297ee874f1063006424fe6ffa9a83fd7e4ad84535023983f1abd265bc85479addf202c218c890e92f5f19de179fae40d40bcd8dbac9eb767d3aa3910f0b1537408adf9cddb1349e9f4a76ca5beeff6a8e5ed6e63cfe25cf40ff0aca6013856ecccdbfc71b431fe3a2d52d841bc7e9b63418a9fc28cc72eb8d679d20fd1385c67be213f9d86f5e814c6b77a17cb38cfef94d0a89f03e3cdcb3a4c3a3a25db841926f92af8922e07a42421676f92e72dd963e18dc867c0a18b727bd732fdc8a30977c436100fd0eb799648bfb32590f69dfa355e5601943f3930fcb8302694adc29294d29291169226d35dfb40d57c05876f1c91790974c0504eaef3b562f5ade926293394203baef90fce87102f5075ca9ff5ef1e0c31c0f320e65cb24922874316a2f294a41509a7bbdbc9427b4070b2f5d3bf3348db016a80c0e76fed8585d9b8d7c198d489283cc6ff915ae35cff1a28844e87a03bbcc9f6d31582e9fd3689f880e0052eccea5aaffafd45afa9925a1d2a38c2b23769d85d3577b8b0623d17e490375a3112de608ef1e11e5927ab1353064669f0991b6776f3fd6f376aeccce9f50e5fe13124b4dc61de84b519d76c638fce1c29d18851cd50a2b7cd45ecd472a0631d51f4527e8fc486e1845ff08bdeddacb18f750ffd7bcf85396c42f7ab1be7e381105990e0c98902b1e586f8ef406095240865c453d5de2f377d8ac4c42bf8d3cd4669098ca3032e8548fb1657d4cd3b6a091a0afc98976caa01af66be796bc59bdb5e54e643c9735b431b33f22768f7805ab78c8329ed985f8aa635375a0529e89f39c07ead8eebfd1ffcb9cf7ef4bcbe319b7012835448ea0fb8fc299911f9408ed041fe18dcd2bf2a29d51b377cd33029c60c0517d656c59a2857727a494cc44bc1ca5ecafb16f0b3956f7ed4bd6be3f8e979b20bc801d1d0ac9cb3c04dd4227c3a820f0ee298bc5f2e13d1b95859dd423d2634a48907e0bc0b06a3475f00834d270bb6a4a5925f3669a92e5e1263efe57fad28f761d45719e0c6afad1e7b33a77889d5b4f5e651723b328b7bc387e665de25cb2d03c4278c69a01fe96b5828521009e9743d4ec21fab6428a5b9c13b8ee8f47c087a362c4deb058e1c0ade4b3bf594a145584a913bf74c60f3d8c2c72f1b9784e2fcfa9af0f1ddc587fafb8996edde5fe1252d6ddc8f2ea453ec7f335d5f8a0e2ca0434df3cde5e0f8b289ddf9df947fe00a64773a84829c1e882f05724ec462e5758e1ce1b26debbe29117846326ec7e1e119d1060adb4c453a7c94a04c2b4b1fb16b0376386e285695553f6c212540b19c22e52ed0c7c5380fd4755d380379e2246582b996b80b519a5d87aa2c98d52ea2ceb7894e6623ce8021b3bab60069eb1b5e43c173808dbe966c9501c3df3b19d9802d7fc4f31ab6f3886ccdc3df00c8b1651dbb5e081b81892368188992012c0b887a4063d503aeb78782f9da62d63a17f41b080c7fd6c909d71230e06684408f5cba8c3d77e46bc9bc6ec04af30f70ca92b6d432a36747d65ad220c0fb610ee5addf21e9e11e261c1e03ee5b40b33e115dabf8a1545a9d27b9c59c67ec2d125b268c480925baad341d93f704dc2c164db56627a043fc08e4240a63c634082c58d1d23715a49554b5a96c30d2b698b57941a3773b4136526e231cce61cbd9d90aaf8a003008ed1d135486dadc33a994fa86319e2bf961d6314f62469e371c55b5e390ab8fb1ef8825ca874eb632b0ab856869e0e0c1e16c1a456d748515ca65010c11d931f2544a2a79657f7b75ea031bab51d91c78b4688a1504a650d3eee3616dc44bce30c173db6665a63ebe378b33eb448646071d63af3ad5aa0490067ccd772a84b13bdee82df8bc91dd085ee614e7759a53ec2403e7fd64e64a1fa705571b04f206be1e2bcfbdbfb0468b2965d20c3a49c108ca897f447014f845b5f08cd37d565ccaf9145e6247ad90e3f5a8488873774e9741c58b8058888ca6228561dff05e730036d4caab5325fa4a170426f3c1c315da2b8f4f3f40590e3197bee2e71d33a6e09522d1a1817b5870f87a1d57a257e510019fa6f04e666f5c14b4f972c1b621c817e90636c2b10a011c91e4d1c542197a6f189a9d11b9bd7e1491c4566e73bb2d061ce9afe6b9a0d0347cd005834a475948eaa069e586a5bb27872501da21a1e1b1c33c00723daac9b51248e3275a04da815cd16210923e13edd95aeb7593ec6ad69e8563f58caa6e7c22da10389e043efa7455c2fa80711822376641673a8e6ea3178b53ca27c54be8596b74d763fa223fa74e37d5494348b735ed4c4d9e1fc5b68211013d4b76cf7fcde5a8db8ad6339302eb70922814142484040314b1ee32030a82f941a27b9b16ed1718b42301da480c2e9dcc13215c58fcb20514aaa5330148ad532e9c99c270a81b8ee0bf87007dbcdc973ee868868254a0a9a0ab7d9fbe36bc39e853439b736169609961f91dd0fb0d119988e5122d7563b609dae6aece25c206cee36f55338dd267ceaab5f27f753f057d478579aa3f2b5a05b35234765b3e2744c2ba4e4f210e579f051a02b8e2139f461174c61e6bf6d98fb60cf363a72758b0c7c4eebe7241c3cb5654ced6f1e4f2d77aa175d37d2febe96991598924edba4175f65c1c3ee2b81b83b342d62d2d90fa1afab42e49c62fc0a693bc951a0eb3de13077ad3eb2131d293a53c2966bde6ac42dc7c4b4c44102c8cc5b41bc1fba7016f3172fb386c7a9d689e1336ea07e6e08cc223a16e081c0abae11f0617caee4e129f4bc12b08ec4ed6b370bc808c1e6727e14fb3fc7b99e53c898114db1e2445cfcc5d2ecbdc1321ee43be654ab615c274f96621d4405abe0c622ff29ba7613794d2fc175368247a1eb5123d1d650360dc1507141675f09b748a4a155017c181d6b77df4c796cdb2eac454d41c4c8c8eb31fce024994cf0ec1ce32ecbf19d55051129158033dbc1ba8317c0cfe4538126d45d88083c8b03686845aeac0a0cbac784ad6f1a382b23631c2d943298dd341e7301de3423fbcd9bd656406132ea0cda4e3b0c7772dee8ac5811519667d1f461c27f4542dd796c5bffe7bdbaec9b37257b1589f255d7cae31cbbf297183f528738853aa617ad3b52bd6412bc13ed20da6d7aa7c0ce3e08005dd21c7554f9f37915a5780ae78568a6d9b6af2cd82ca69ddf6611c98a45723bb701d83ff4bb14c59e4f0e232cef1c5102147c9e744f7b83e10105339ecf47dc0e7ab3c2139", 0x1000}, {&(0x7f0000000200)="f12bf8c9597ccf1f52b65aea70939ffa9f86af30a455b022740707f1e755a9ea5c3ad1947136782f8a838a915634dfd14f93306ca92d3107df9f2efad0b35d36644006bbb947970256ffa2cf05131c82c3786652eb975bec79", 0x59}, {&(0x7f0000000280)="c61e1231f2f5151cfe8866896539358150d296fb35803ff199dfc2f4bf1d4719b374b2426a021bbd50bc", 0x2a}, {&(0x7f0000002100)="e4bd40bf2ee60a0be66795f0a2ed1a8dd46dbfa0a12d14cc84d6cf1146e63f8a54e3172bc56b1ecfa4918d1a9657686eac6f585138ec075a06f4433ba48614c2723cd5092eb33f0c2d43a1e04bea30aac5d0b0b42e0d455a42ad60a8d1e4e8708bdf7fa74d217dccdf294eac6c5963235731d1cd25837a61b17e5c56f7af5fe0edc30610878514a4b25601b6a852828f0e37e709d7ba814952832bc989913aa389e326162c2476478a06aea89325bceeefce41a618a9d837706771c667399337d23ad55b084830327b946ee034654c14941d07d265f03289d78edb43860be5378e54e6eb47f4caafe6bcaceab0722add3a55820ede86b5c937c9d3c0a7a09126acdd61ee04c6c4d4c305597a6c65d613c4e20278d19c2be38c6930462729727477950d8a4d1978eabe2859814777a919cd7e71ea6cac9b3cb2e6d04af353bccd74c09df81fdcd0b8217d2232c6690829dbd9b9f54f4bda33605a1a38a60ae8ac867399642686be9df9680add5702afa899fd6274cfc0aad17641a422619830a54e1870a3dacb5a25debe613cd6fd8d80a74213a64719e06c2461cf574016eeec82dcbab272b5b1e265eb2883ec44025827882ed7628608662abdd59f6da34603b7d712385e56b9e88baa54664427203f74f37448d161395c2a45edebaf53b7036f7e8e9b725f8fb839083230f3a87fed3e803c3c94315104817a2ee363e0fdae68cbabb7eeb0d548faa37201f2af7f3054a6ad144c3a2a05da7ebfa0116ebcd6b594e71695535fa44adf55c7a113a27544a25b2b9d7e0b6d00db26e1e8d0dde24f4fce438167e11b7ba480b00de813da148d7312ab6247d3d3dfceded75d21ece71b98e7db5a56c19af64bbc26c098bd1946143a923a524373c87951c3978d048bb12828dfee904e62035b3a79ca06dd14a76aa890e225611a22fa05c3eabfffbd7d4c415986260dafc6421a4170c1b3bd3390e8c0b70ff390c694f967d5b48e37a6307cf9e052e890796942f9d1c79d3589a438bcd8b86b67e7004c15a3070e027a03fccee606ecb32cfb963d32e3c63a57886656f4a9e23b64d1bcc22d4c08d0649669600b79db0b2f23c1081fceed7ca971c460c6e846b06b6ad93a85e7516b2902b65d7d6ca699495ef3065d8350f3bd664d06c7dd37322522dbd2874a31ca2b8da220672ef22aadc5d75413ae1738d15dadc9363119e44f6528509e0ebfb7757c77d870360ad92d593a44ad70e6cfe9946983073de32aca3c72e59835105226d161540b25116ccd4ac1c96db15b82fd9b95d57b2a4235334d4f8d35977a9db2a08a85619a47de3c54c06ecb149bd976729b8c34ba8668c9fee9252a1c47275697b76e7e55085b9ba3ebfc177e4e8b9a1b003ca3b1c929349bcbda2a7616b6a52d7f0317fe9729c823d649a324af5115204b16ae522b4e82833bac2c1e65a3f409fa1b08d60fcd63e7be01c4857391ff3cf9f06972a499e0cf90644e2286c48fe2cf1b1aaf73f005d1ae015bc45b45df72d41896da97eb87350e47bd60f2cf8158d9ad967f163f65561684527489b1076722d4716caf6d589028b851c116e2e4884b5d9f7f2cbd565157d7d0cf6366658ac9b10375118999cd6ba90083257ab7ff29bde3ab87c28092dd85880e79b2ad526ee0607826ed92ae3292a74f00aa50411dfdb796a6e7b5e45b37a00fac0811c44bedcd346e26ac1a2b1d90b8fbb7715e4ef5e3f5557cb38524a9bde7368d3b9129f2c1c2c8d1d5ed6782891b09ffb3c2fbeeccf214cc846e1495e0078bbd214ebe61297818b923cde7c109a2e12c9d577ad13cbb01f1919cc5ac6edfdc9933ddc9b12afb67d5615c4f94b553bd1ac27b36d94251021d0222c9622ceb581068c79ea8d486175af051e752096ac7d549dc40ba1e838dc3e61d72402a849b4a57e7afcd5678ba7b11211944d05b45ee4871c82d4d4d78df901a9848863e3ec054a8e91245e52f9727308bddbe223a8c691be7471ea90e5be88cd3c82c5077e2e10406f19a1bdeade55b6464d0b9d8a5404f73d60e52a3d4b26a024541bf88d208fe0b532fd07bf64ddd34f94660c72285889dbb24d80e9b80e75fd98d7688e54bdae25533c62020b9256bbcdecd395d5e9de53418d32e961b97b6d434e49d079b499776190f27481ad4fc492d5ba53d5dabd41ffc7057540ee33cb3d5a57b589f39e3ae8cc223caf07ac2efc9b5063230eb4c4806335702784d58661204de5735c2b8d98b0b7a37b8cefdf3d842a2fe3de8cbb6a66bafdf7ec79b8a77b9bbddf694f2ee0c49d1104722ca9f5f90278f535102b7a466461e62cf22deca44ec442a4161319ff1e659af217fe66b0d02cda323c403c2b8d63569d632e7a219681afe3d337e21b6949590f6d491291f1ff83bbab29c70b05a4304fbe0b6d9596be00c6224e543bebffc64db22530758a26c5b545baad35b8ed247a4b505c8a9c72cac4f3aa1303562a769eb905f5cb3f13fe57598c601bb89a0b297abf3ca5880e6b0cd7d46ad3ec0c1444e295e23348fee48b8464f0dbff7dd2c760c9c59d964b602a998a1546a97046f3901cc6cd15cedb7ee2ec7a4e13fd75014237fd6ff4342c45add0e0bcf042cefdfd0e2811c04921931b184cc9fd8ffa6cc64defb6300c34cfb49f42ebe25d3ad6688a42d59e6593470662ea90d3b62ad0dcf387e3b295b6d1d032db30b3ba87ab264d831875eafbf611ba383a20fe97c7883abd2c31d6b9542cc988ad913c78650293c5269efb1f63ef75201af7a7bb20336fe16c46976e0eb8708152b2b6c651e3fb0111e47b351d5907232bb9d5016fd24a9924518f6154467a19003f2b502d3827428033530489496594a3f914a343db4bdb0d396d244eb6632e1df686efc16fb7baca3fdc03623a38b985112732b46946b1dab0797ec530c751f88b644ba616f52fd20fbea3e9f64bc7a620618ebce138f43f4b6a8c89a43618ec402f8fdbbd1024d105ca1dfaa8ef5e1396620c4a6b404c61f23a0dbb1a8cb94f3e7f3d3a215913aa0a15e6e201b4665861333b7e9195e4aa9b18592171ff3f1cdd82bdc6ffd98ed856e5a46b9660a600a0eb4f6d31876dd0fde9472783ba6affdd9c7b8796c5cee74c15b5360f8720439b9918e21dba0f50e46e646e92d049cd3c0c19e7da2958f3d54bdc8e3a22c6f5c498e3b88fc09f5fe6372f5b2062f6419144c7195e38fb79512bb1ad948295a66385b8c35bb248d901e346d7c12b80fdfd4224008cfdedccfccd18df688d7e23c236d69dccdd5d517830a235a08e64a584d774e4e9a9bc3c01862ec48fee0d0ae5bfde96f6638fbc44da739794195f2dc0a70047c2e6f4234339b1d6060451c1765b48fa8ae9c5acdf60c6e5cf03c34a1fbaa6fed05d739560e6c582100b58b8bd01469e03f6f6a9e56a30707c26fb1fd8a826db8b5862fa6966973c1dfc3d430a5284000efd49831c732b423c771da6537fd94c6b69993e1a2f7c523fc074588fd7f931c5767bfee380e579d5527312a0c66f717c608f9db677b56ad17d712d7356dcf6db521d0b899c1dbcb105537aa05c4409f612e9054ad23d4105689d1730391c5f441b653d500a8fde672d2036d2dbeacb5720d8e7d42157365ce1368895b87257607e5a34646acbc15ff9d020ea8898ba98ddff41dcbd5dfb3cc3ba2e7a8647473f82de0dbb62da753e98ee3c3635ed16ce38e3c31f4963bd0d38bd484263eadb839de43d807788784924225858562cb8b245b3f588e2c3012e8898d461526f10358238340edfbbf6596203e41d08b75d9323c90658995436cc43dd2b71676518147f87ae64e5f03b7226d88d628a2e311023ce4f4d2a6dd4319a9ab4085fba448ca7db9b6817da96eef91fb2d7bd121a9ad9208604ca72f72e3bbad445ec44f117610b2ab61fa9376a009a4ea0212dccc05a3a63e12df7b41d57160455ffb9858163e3e6ee81f9b0fb60687ab3abb0a31502f2b15305308f659770cbcfebce08756671bd56389fea06a6ae6284bf904c80c9623f7030f905f416efa4c9ce41188b283dd5790c188e6e23055b7331af95802afc2f397d007f07c43f51b1ff0938c90711f5a6662124e89e26ba8a666477c9716ae10aa946e0f5b757f49f3ee3e9860f973c363b18739f932e1dbbd64758b9f1ce39ca3d943bd4567ce993fbafbdc112e00dd0dc20f8401b719dd281af27ff08a2dae826cbf64fd3f84ee8bb84a92ad5c0ada014103cd7f4d4ba6eaf4e9a92004d3c723da9eaa247a1dcc41e5b1611918315f0453aef2e294b837c7cc7c0597a6b74814d5bb723a75394a134212cca09dd46e71c60342b3afd69843f3c14ef2a920e066ae439816fc8e852aced76299101d632387f15d1d8ba11923f6d4a6904f438350ba3616777c421c961a66b9eadc4fbcb9dfdaa0b57919ff10dd8473b743d78b7a64d1de70b4a35848f80f3a0e5684c29b95b779c380b123dacba505991fef616fd9c8e162f16cc630ccdd4f623a5cf5bd67a96dad5e8327d27e97cc7755173e98426453759c1a8a3f32d76db880f799c94a2c2d4c292a32f71026df6b4d5ff5734993e20fd53b401cd5d32b5e3463342609f052a622c5095056436fededb598073254ec560d9360cddbf842cca444c1c2e24035cb62bbed57b7bee39da97dbaf547bf732fb54ccead184dc4fe128c05a8188cdedfc24c62ecf65414088492a7154e0a1dec5ff05b93e83c8ccbac60a25d101c3329112a0a564c7785f4a2716a0a53f9d418cbd0ffdd73084ab742fba47de331d71f1c66442e73e66c5d911b619c3421b01216bf78faa9369bb1f5b2bfab167388e5f85fde13532a606a3a6bb516a48b10f1cf3cafdfbb52fb6db4f553ea6e7a324c481ab7c03595e9e5853160044dc7ebdba7aa200ce4074a4f55aca7ff20294784ca534da5388ada1d7b738f6ad03aa971414449228b9cb7518aa8c65886971cc57b7ee2a763526a410c440ec994184cc7256cb8f88eefa46860b0184a8e6b4e1f38e851c44367975eb040e79a06a0859d9afcfba85393d0129e868b7c04cbc12a499274e9a0973e4f2bc00f72677c891d64b1d81a37890170135f94e8181c8a6a3706da507d925d909f73847cfcba40ad47dd6cef08ad909d250175beb945dc69d10397cb5a789ff06e8b107938556b4d59667987413f870a31ff8d28a077d460e8ae036cbbf72945d2d5186eefae8984747d8aacebb5c370879e8f3c0702a99c92e960a6b461e24bb037450e2185f1ae8e65b0d227ee7fc63542eb3fdfee7c64f4a6bafd9057be8d26e1270bd1ff99fc27229b46b4739930a23d0f25214afe2a22641f15c89135d641ec189f2167f90e3142afae84b3b4a49e0201757302c5aa4a4d3e36905b67f9809f485bafe2e0ea39c327849bb1201756490a31c734ecaec7ccf40bce33ff1e7294fad410e7db976689ae4abcccf572b260e71862b923ace26e012e5da676ee25ab67c63d047297fe97d3b648bf5f01d4603666bd3286a369353523aeec4b3a1be0f6bc7e2d7491b6a0b1af181f77b27c7433280617352e9abb5270db55470b9dd814db32bd6334504441eca948c3d5a67433298a22d79bae7ed4d72470aa65e2f1a9e336dc1a746c92c7d3aefe19244755b4293ff9a40e15d39424b8934c11e296de1f608f0092236da063342b09b33fe68d3d7e59e5925c0636ee7014ddd39c5754b3b0323bce67d244da67c4feeacb94d6861a53b34229e902e4446e9939d6fe064f3c5edd6d546b59233edaaabda5279f6984f666aa3d8668600e76ce9b8be5b3db", 0x1000}, {&(0x7f0000001400)="2df311ef80a7858489c638ed806c2cac56154831129c260d02b7c0297b31ae8149189a66901e010fd79e3ef6f5328b23ab80505c161ee01e0f42bcfb3d0642cf20a064dd89b77efee9c0a65cfb873f57be232b895147576ea3728be69aa5903499df72d58af9ddc65a6b31c12df7bc279b3a2b94bf7e06d862492af130e4cbcf1f791a6edc84b50dd06758b062281246ec77035e214b4eee87af57ceed7eab46fd748e5bd5", 0xa5}, {&(0x7f00000014c0)="7d116fbf7f9735efe84027da5c5b5d70dc8958547ceb08de590fe6b221a4348565712c935cb55aceceb7c778f83c4a10ae2111a3f80c0b0242a7dabb2ad3c334ce7bc13de53db9c2d2130f68e97bfc68d19ecd3371691ef38ecdd9cd1cd4a7a770d99a0ad5256b9bc8921326b811dd5bc675ded80ee7653bde99c5f7b5c550caac04b9369c7ef759cc9657d1f7eb85fb8f77e799a5d813755d6fa8d4f8", 0x9d}], 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], 0x350}, 0x8080) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7ff, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x2, @remote, 0x9d}, 0x1c) creat(&(0x7f00000019c0)='./file0\x00', 0x64) sendmmsg$inet6(r0, &(0x7f0000002080)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, 0x0}}, {{&(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}}], 0x2, 0x0) 14:45:45 executing program 4: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:45 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x4, 0x40400) write$P9_RREADLINK(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/16], 0x10) r1 = epoll_create1(0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/78, 0x4e, 0x8) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f0000000100)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}}, 0x0, 0x0, r2, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x0) dup3(r1, r2, 0x0) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYBLOB="00ebdc002d4ba394ca303030303005000000303432393439363732393650"]) r4 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000180)) r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r5, 0x0, 0x0) r6 = eventfd2(0x4, 0x80000) r7 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="eda7f589e0f4655fe0f4655d00b2ffffff9900"/29, 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r7, 0x0, 0x0) r8 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r8, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r4, 0x40}, {r3, 0x9}, {r1}, {r1, 0x10}, {r5, 0x618e}, {r6, 0x1800}, {r7, 0x600}, {r8, 0x8408}], 0x8, &(0x7f0000000240)={r9, r10+10000000}, &(0x7f0000000280)={[0x8]}, 0x8) 14:45:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:45 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00'}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r4, 0xffffffffffffffff, 0x0) 14:45:45 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 321.113907] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 321.146324] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:45:58 executing program 2: clone3(&(0x7f0000000200)={0x800000, &(0x7f0000000000), 0x0, &(0x7f0000000080), {0x1a}, &(0x7f00000000c0)=""/84, 0x54, &(0x7f0000000140)=""/113, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) r0 = getpid() move_pages(r0, 0xfffffffffffffe04, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fork() r3 = getpgrp(0x0) sendmsg$unix(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x1, 0xc, 0x0, 0x5, 0x0, 0x9, 0x40000, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x6, 0xfd1}, 0x204, 0xd1, 0x0, 0x5, 0x3, 0x80000001, 0x8, 0x0, 0x10001, 0x0, 0x3}, r3, 0x5, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:45:58 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r4, 0xffffffffffffffff, 0x0) 14:45:58 executing program 7: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x6, "0000000000000000f100"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) r2 = io_uring_setup(0x4000000, &(0x7f00000001c0)={0x0, 0x0, 0x20, 0x0, 0x161, 0x0, r1}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r4, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000000c0)={0x0, 0x5, [@empty, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}, @empty, @multicast, @local]}) copy_file_range(r0, 0x0, r2, &(0x7f0000000040)=0x7, 0x9, 0x0) r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r5, 0x0, 0x0) r6 = syz_io_uring_setup(0x1ef2, &(0x7f00000003c0)={0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r6, 0x7738, 0x0, 0x0, 0x0, 0x0) io_uring_setup(0x3d49, &(0x7f0000000280)={0x0, 0xf691, 0x10, 0x3, 0x15, 0x0, r6}) fallocate(r5, 0x52, 0x0, 0x7) 14:45:58 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:45:58 executing program 4: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:45:58 executing program 0: io_setup(0x532, &(0x7f0000000000)=0x0) io_destroy(r0) io_setup(0x8d3a, &(0x7f0000000040)) io_setup(0xcc6, &(0x7f0000000080)) io_destroy(0x0) io_setup(0x32, &(0x7f00000000c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x5, &(0x7f0000000080)=0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) openat(r3, &(0x7f0000000100)='./file0\x00', 0x305042, 0x44) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_pgetevents(r2, 0x2, 0x2, &(0x7f0000000040)=[{}, {}], 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}]) io_submit(r2, 0x1, &(0x7f00000009c0)=[&(0x7f0000000740)={0xeffdffffffffffff, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_pgetevents(r2, 0x3, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, 0x0) io_setup(0xfff, &(0x7f0000000280)) syz_genetlink_get_family_id$devlink(&(0x7f0000000480), 0xffffffffffffffff) io_setup(0xad, &(0x7f0000000600)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) 14:45:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b0243", 0x67, 0x400}], 0x0, &(0x7f0000012b00)=ANY=[]) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r1}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x80000001, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="47abc87153b9250c37ed9ae0a3a53214cbb930ac1c7db0c6c37719b397a37123a700f703c50cb3f7c2b14b070a5291a0dcc3d8025ad64d5d5d5edb9503b968e3815a29466806ddfd50cc2c99deb871a3f53146a65fe9ec05920fe847bc80530c03bc216cf7a79fbc2c12b6040a5f13c67c0be0111550b327326fa9dcf4e5e895b79d7ce0c56435ab57db0ede7686b80143922a4f50114ab0ac5e689295832c6e6ed1a523659d9dacdf39baf4b63abc58ccab04b2893c", 0xb6, 0x3}, {&(0x7f00000000c0)="b56f56fdb1ac14a7b4c061dca6f3ca2a6d7036c1def19d8e5a11369ef5a5ec60471971409d4477bab4d7", 0x2a, 0x9}, {&(0x7f0000000240)="8ab883dea9bb79731ea1725b673f705f5f1dceab873d485163b80d8ace56d0370a7a87275fc140e8e01a993fa3dc611dc87fe9390be1aa4b2813fd9abb54cc62f7", 0x41, 0x3e}, {&(0x7f0000000340)="2792719ecbacf3cf9f9049554ce2c38c126ea571ee85e9f3c64ad0cd5444fb8a34880497e458f471e79bd5e044ba80249d6379b6e2e75241ae5512bd60b92a089d0a1f406920e6c1ca08d6925fb41023b95db4a5ade635b8af60d44ac727ed482820ac6db3ab948e81c1dc994187f4f325fc376bc03d4c9ad68739fbc90ed8aaab762bc6c5cd52319572fe12d428f1ec64108fef6515fd2ab535305008c66c7c6efa15fb4b4f31451ad26f6202c821918082b96460417d3c88bc91d0b3b239730c19c7537eefa80e30284dd5ebb6639a5e547a74b80cb26909ad0c16913876f3be6759b1c2f022b87a5ba1e9a89dfa17d74da1a584d5f9", 0xf7, 0xffff}, {&(0x7f0000000440)="00d41c0b985828a770742243cc1c635d7ef8184843acebd2cb5128a6dc7ada47a64bd9fa2ea13b309e8fbb24877a513277", 0x31, 0x2}], 0x8004, &(0x7f00000005c0)={[{@mode={'mode', 0x3d, 0x100000000}}, {@huge_advise}, {@uid={'uid', 0x3d, 0xee00}}, {@uid={'uid', 0x3d, r0}}, {@size={'size', 0x3d, [0x6b, 0x70]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x35, 0x31, 0x33, 0x6c]}}], [{@obj_type={'obj_type', 0x3d, 'ext4\x00'}}, {@dont_hash}, {@dont_hash}, {@context={'context', 0x3d, 'user_u'}}, {@fowner_lt}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_appraise}, {@dont_measure}, {@uid_eq={'uid', 0x3d, r1}}]}) 14:45:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 333.407790] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 333.428014] EXT4-fs (loop3): couldn't mount RDWR because of unsupported optional features (430000) 14:45:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 333.447863] device veth0_vlan entered promiscuous mode [ 333.463497] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:45:58 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:45:58 executing program 1: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0x5) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwrite64(r0, &(0x7f0000000300)="af", 0xfffffeb2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, 0x1c) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendmsg$inet6(r2, 0x0, 0x8000000) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, 0x0}, 0x404c008) [ 333.492786] EXT4-fs (loop7): Unrecognized mount option "/dev/bsg" or missing value [ 333.604358] device veth0_vlan entered promiscuous mode [ 333.618126] EXT4-fs (loop7): Unrecognized mount option "/dev/bsg" or missing value 14:46:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='cpuset\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x10020, &(0x7f0000000200)='cpuset\x00') 14:46:09 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x42000, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x3, 0x0, 0x20, 0x80}]}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)='\x00\x00\x00', 0x3, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r2, 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x42101) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000300), &(0x7f0000000340)={'L-', 0x1ff}, 0x16, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={0x0, 0x0, r2, 0xfc, 0x80000}) r4 = accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x1000) setsockopt$sock_int(r4, 0x1, 0x2e, &(0x7f00000002c0)=0xd876, 0x4) timerfd_create(0x0, 0x0) 14:46:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:46:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x44) close(r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(r1, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/163, 0xa3}, {&(0x7f0000000180)=""/235, 0xeb}, {&(0x7f0000000280)=""/212, 0xd4}, {&(0x7f0000000380)=""/197, 0xc5}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000580)=""/18, 0x12}], 0x7) syz_io_uring_setup(0x8327b, &(0x7f0000000640)={0x0, 0x0, 0x20, 0x1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 14:46:09 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000540)=0xc) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x43, 0xb6, 0x2, 0x1f, 0x0, 0x1, 0x504, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x140, 0x6, 0xdb0f, 0x0, 0x8, 0x200, 0xdd3, 0x0, 0xfff}, r1, 0x8, r0, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r2, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f00000007c0)=0xc) r4 = getegid() setgid(r4) sendmsg$unix(r2, &(0x7f0000000840)={&(0x7f0000000680)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000700), 0x0, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {r1, r3, r4}}}], 0x20, 0x4}, 0x4000) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) preadv(r5, &(0x7f0000000300)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f0000000240)=""/35, 0x23}, {&(0x7f0000000280)=""/60, 0x3c}, {&(0x7f00000002c0)=""/5, 0x5}], 0x4, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') perf_event_open$cgroup(&(0x7f0000000580)={0x1, 0x80, 0x2, 0x8, 0x8, 0x7f, 0x0, 0x1ff, 0x2208, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6186, 0x0, @perf_config_ext={0x4, 0x1}, 0x4010, 0x3ff, 0x101, 0x0, 0x100000001, 0x5, 0x7fff, 0x0, 0x800, 0x0, 0x4}, r6, 0xc, r6, 0xd) preadv(r6, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) recvfrom$inet6(r6, &(0x7f0000000340)=""/147, 0x93, 0x42, &(0x7f0000000400)={0xa, 0x4e22, 0x1a6, @dev={0xfe, 0x80, '\x00', 0x31}, 0x68}, 0x1c) writev(r5, &(0x7f0000000480)=[{&(0x7f0000000040)="c6c055298a0309b9b216098dc2210f458b30b27aa5fbc043fa63432d82191579639a71d4f7245f757721c27f2823f1e82082643d62cc14527f664c9644bb35b0ce774c872acdf72ce8be5d902fe770030a3b0e1608f0b4109ad94c45110b1f81f0ba117063e243fa00c56fa2c35867d968d8cca4dba103abc92905746c2610568deccd06a54052bbc7f5ab5b0dc8047a18b0232cc49fe7d864e25a19533563f4b6ae577817090a7ff855b55e2e18f4d45778afe48aace6f861685797db7a3f47c463bc6f307562d13c36345386b23801d8", 0xd1}, {&(0x7f0000000140)="17fb87e16b108033eb8f5918f222903b2230b0f85139b7615d34b941dae5eae4f44a82489fa8df1f65d1b6e1f30a66dff96a2031ec8172c8321cc783b2f661760cfefbbfbc6e7215435e31fb92d301de456c973fe6d193e201866b156b95a13463b6ce0c24b8c13878c9bb556e60346e55ed6d149157341d3515bac150598b11b2233fc93b92bb7259843673572f41719438bf0bc3c3dea00cae654bef4dab93edbc871cb2e4aea7ec924d24453e1abf456dcf1ed7cc59718de78ce132b95c996b7b32f66022a0f592af4c4e00f9c4f41a0ae6", 0xd3}, {&(0x7f0000000c40)="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", 0x985}, {0x0}], 0x4) r7 = getpgid(r1) perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0x8, 0x93, 0xff, 0x1, 0x0, 0x2, 0x8040, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x86cd, 0xb, @perf_config_ext={0x40}, 0x10000, 0x9, 0x4, 0x1, 0x1000, 0x7, 0x7f, 0x0, 0x2, 0x0, 0x4}, r7, 0x7, 0xffffffffffffffff, 0x3) 14:46:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r1, 0x0, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r2, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x406, r2) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r4, 0x0, 0x0) getdents64(r4, &(0x7f0000000180)=""/99, 0x63) getdents(0xffffffffffffff9c, &(0x7f00000002c0)=""/154, 0x9a) setxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000400)='system_u:object_r:etc_t:s0\x00', 0x1b, 0x2) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000002000210c0000000000020000000800000000000000200017002f70726f632f7379732f6e65742f697076342f7463705f726d656d00000000"], 0x3c}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0xc090) 14:46:09 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:09 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r4, 0xffffffffffffffff, 0x0) [ 344.729913] selinux_netlink_send: 5 callbacks suppressed [ 344.731501] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5462 comm=syz-executor.2 [ 344.739619] audit: type=1326 audit(1628347569.409:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x7ffc0000 [ 344.746478] audit: type=1326 audit(1628347569.411:20): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=257 compat=0 ip=0x466609 code=0x7ffc0000 [ 344.760809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5472 comm=syz-executor.2 [ 344.764632] audit: type=1326 audit(1628347569.411:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x7ffc0000 [ 344.775385] audit: type=1326 audit(1628347569.414:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=317 compat=0 ip=0x466609 code=0x7ffc0000 [ 344.787513] audit: type=1326 audit(1628347569.415:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x7ffc0000 14:46:09 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000802}, 0x1) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1/../file0\x00', &(0x7f00000000c0)={0xd236eb467a577f7c, 0x80, 0xa}, 0x18) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x4040, 0x44) r2 = openat(r1, &(0x7f0000000080)='./file1/../file0\x00', 0x25c1c3, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) openat(r2, &(0x7f0000000100)='./file1/../file0\x00', 0x200000, 0x40) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000002, 0x12, r2, 0x0) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x15) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 344.793891] audit: type=1326 audit(1628347569.418:24): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x466609 code=0x7ffc0000 [ 344.799516] audit: type=1326 audit(1628347569.418:25): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x4665c7 code=0x7ffc0000 [ 344.804214] audit: type=1326 audit(1628347569.418:26): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x419777 code=0x7ffc0000 [ 344.812060] audit: type=1326 audit(1628347569.421:27): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x419777 code=0x7ffc0000 [ 344.819431] audit: type=1326 audit(1628347569.421:28): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x419777 code=0x7ffc0000 [ 344.837497] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 344.839587] EXT4-fs (loop7): group descriptors corrupted! [ 344.862219] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 344.920957] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 344.978169] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 344.980009] EXT4-fs (loop7): group descriptors corrupted! 14:46:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), r0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x88000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, r2, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2000}]}]}, 0x64}}, 0x4) r3 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x442, 0x5a, 0x1}, 0x18) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfe, 0x100}, 0xc) 14:46:21 executing program 1: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r4, 0xffffffffffffffff, 0x0) 14:46:21 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:46:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x44) close(r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(r1, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/163, 0xa3}, {&(0x7f0000000180)=""/235, 0xeb}, {&(0x7f0000000280)=""/212, 0xd4}, {&(0x7f0000000380)=""/197, 0xc5}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000580)=""/18, 0x12}], 0x7) syz_io_uring_setup(0x8327b, &(0x7f0000000640)={0x0, 0x0, 0x20, 0x1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 14:46:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000540)=0xc) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x43, 0xb6, 0x2, 0x1f, 0x0, 0x1, 0x504, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x140, 0x6, 0xdb0f, 0x0, 0x8, 0x200, 0xdd3, 0x0, 0xfff}, r1, 0x8, r0, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r2, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f00000007c0)=0xc) r4 = getegid() setgid(r4) sendmsg$unix(r2, &(0x7f0000000840)={&(0x7f0000000680)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000700), 0x0, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {r1, r3, r4}}}], 0x20, 0x4}, 0x4000) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) preadv(r5, &(0x7f0000000300)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f0000000240)=""/35, 0x23}, {&(0x7f0000000280)=""/60, 0x3c}, {&(0x7f00000002c0)=""/5, 0x5}], 0x4, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') perf_event_open$cgroup(&(0x7f0000000580)={0x1, 0x80, 0x2, 0x8, 0x8, 0x7f, 0x0, 0x1ff, 0x2208, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6186, 0x0, @perf_config_ext={0x4, 0x1}, 0x4010, 0x3ff, 0x101, 0x0, 0x100000001, 0x5, 0x7fff, 0x0, 0x800, 0x0, 0x4}, r6, 0xc, r6, 0xd) preadv(r6, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) recvfrom$inet6(r6, &(0x7f0000000340)=""/147, 0x93, 0x42, &(0x7f0000000400)={0xa, 0x4e22, 0x1a6, @dev={0xfe, 0x80, '\x00', 0x31}, 0x68}, 0x1c) writev(r5, &(0x7f0000000480)=[{&(0x7f0000000040)="c6c055298a0309b9b216098dc2210f458b30b27aa5fbc043fa63432d82191579639a71d4f7245f757721c27f2823f1e82082643d62cc14527f664c9644bb35b0ce774c872acdf72ce8be5d902fe770030a3b0e1608f0b4109ad94c45110b1f81f0ba117063e243fa00c56fa2c35867d968d8cca4dba103abc92905746c2610568deccd06a54052bbc7f5ab5b0dc8047a18b0232cc49fe7d864e25a19533563f4b6ae577817090a7ff855b55e2e18f4d45778afe48aace6f861685797db7a3f47c463bc6f307562d13c36345386b23801d8", 0xd1}, {&(0x7f0000000140)="17fb87e16b108033eb8f5918f222903b2230b0f85139b7615d34b941dae5eae4f44a82489fa8df1f65d1b6e1f30a66dff96a2031ec8172c8321cc783b2f661760cfefbbfbc6e7215435e31fb92d301de456c973fe6d193e201866b156b95a13463b6ce0c24b8c13878c9bb556e60346e55ed6d149157341d3515bac150598b11b2233fc93b92bb7259843673572f41719438bf0bc3c3dea00cae654bef4dab93edbc871cb2e4aea7ec924d24453e1abf456dcf1ed7cc59718de78ce132b95c996b7b32f66022a0f592af4c4e00f9c4f41a0ae6", 0xd3}, {&(0x7f0000000c40)="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", 0x985}, {0x0}], 0x4) r7 = getpgid(r1) perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0x8, 0x93, 0xff, 0x1, 0x0, 0x2, 0x8040, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x86cd, 0xb, @perf_config_ext={0x40}, 0x10000, 0x9, 0x4, 0x1, 0x1000, 0x7, 0x7f, 0x0, 0x2, 0x0, 0x4}, r7, 0x7, 0xffffffffffffffff, 0x3) 14:46:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@block={'block', 0x3d, 0x200}}]}) r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9695, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="23aa1b650b5fc7d272c317114539e350b602627b90bfe3b0b90e739a2fa542aa909690bc1fa23a6a1ca07ce574cefa8f2aef5a37e523ad05fb784b3494f404c231a4f4", 0x43}, {&(0x7f0000000180)="ae17c51c15486e4130fd8b6f37310d4a9578a9325a665c84c30ff9e64c2dfb645f317686f93fe8962073b38af5eb92", 0x2f, 0x9}], 0x0, &(0x7f0000000240)={[{'&@^@@'}, {')/*).{-^\\'}, {'iso9660\x00'}, {}], [{@obj_user={'obj_user', 0x3d, 'iso9660\x00'}}]}) openat(r0, &(0x7f0000000280)='./file0\x00', 0x4002, 0x108) 14:46:21 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ftruncate(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r4, 0xffffffffffffffff, 0x0) 14:46:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:46:21 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 357.302904] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 14:46:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000540)=0xc) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x43, 0xb6, 0x2, 0x1f, 0x0, 0x1, 0x504, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x140, 0x6, 0xdb0f, 0x0, 0x8, 0x200, 0xdd3, 0x0, 0xfff}, r1, 0x8, r0, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r2, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f00000007c0)=0xc) r4 = getegid() setgid(r4) sendmsg$unix(r2, &(0x7f0000000840)={&(0x7f0000000680)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000700), 0x0, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {r1, r3, r4}}}], 0x20, 0x4}, 0x4000) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) preadv(r5, &(0x7f0000000300)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f0000000240)=""/35, 0x23}, {&(0x7f0000000280)=""/60, 0x3c}, {&(0x7f00000002c0)=""/5, 0x5}], 0x4, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') perf_event_open$cgroup(&(0x7f0000000580)={0x1, 0x80, 0x2, 0x8, 0x8, 0x7f, 0x0, 0x1ff, 0x2208, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6186, 0x0, @perf_config_ext={0x4, 0x1}, 0x4010, 0x3ff, 0x101, 0x0, 0x100000001, 0x5, 0x7fff, 0x0, 0x800, 0x0, 0x4}, r6, 0xc, r6, 0xd) preadv(r6, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) recvfrom$inet6(r6, &(0x7f0000000340)=""/147, 0x93, 0x42, &(0x7f0000000400)={0xa, 0x4e22, 0x1a6, @dev={0xfe, 0x80, '\x00', 0x31}, 0x68}, 0x1c) writev(r5, &(0x7f0000000480)=[{&(0x7f0000000040)="c6c055298a0309b9b216098dc2210f458b30b27aa5fbc043fa63432d82191579639a71d4f7245f757721c27f2823f1e82082643d62cc14527f664c9644bb35b0ce774c872acdf72ce8be5d902fe770030a3b0e1608f0b4109ad94c45110b1f81f0ba117063e243fa00c56fa2c35867d968d8cca4dba103abc92905746c2610568deccd06a54052bbc7f5ab5b0dc8047a18b0232cc49fe7d864e25a19533563f4b6ae577817090a7ff855b55e2e18f4d45778afe48aace6f861685797db7a3f47c463bc6f307562d13c36345386b23801d8", 0xd1}, {&(0x7f0000000140)="17fb87e16b108033eb8f5918f222903b2230b0f85139b7615d34b941dae5eae4f44a82489fa8df1f65d1b6e1f30a66dff96a2031ec8172c8321cc783b2f661760cfefbbfbc6e7215435e31fb92d301de456c973fe6d193e201866b156b95a13463b6ce0c24b8c13878c9bb556e60346e55ed6d149157341d3515bac150598b11b2233fc93b92bb7259843673572f41719438bf0bc3c3dea00cae654bef4dab93edbc871cb2e4aea7ec924d24453e1abf456dcf1ed7cc59718de78ce132b95c996b7b32f66022a0f592af4c4e00f9c4f41a0ae6", 0xd3}, {&(0x7f0000000c40)="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", 0x985}, {0x0}], 0x4) r7 = getpgid(r1) perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0x8, 0x93, 0xff, 0x1, 0x0, 0x2, 0x8040, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x86cd, 0xb, @perf_config_ext={0x40}, 0x10000, 0x9, 0x4, 0x1, 0x1000, 0x7, 0x7f, 0x0, 0x2, 0x0, 0x4}, r7, 0x7, 0xffffffffffffffff, 0x3) [ 357.325614] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:22 executing program 2: r0 = syz_io_uring_complete(0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r2, 0x0, 0x0) openat(r2, &(0x7f0000000180)='./file0\x00', 0x0, 0x183) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r1}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x3fc}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000280)="ed41000000080010dff4655f7d00ffffff0800000004273f3db52d9f22378e6d3a3a4298b1255430e83bf45ec4147bd9d496fec9555dd1541d73aac30859edcf2163a1acb7bcd84cf9a81534c1169646a5d4c2798baa93471443d4f7a7d281340aaa5164dbb8dab55f3798e9267025a6e5185f217cc3b27c4463fda03a522a06db7fb729afe3d368ed19e2ebe2abbaaaa122bf4ced0757b0a80f6e1e3a46dc45c0c8d1cd55bfbed4a152f2f2d5be3ad9b4316a50d7ae6d30fd2b0786cccba2c0ecd3937c04", 0xc5, 0x2100}], 0x1000000, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x1f1bb880fb712a) set_mempolicy(0x1, 0x0, 0x0) unshare(0x40000400) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000380)='./file0\x00', 0x7, 0x7, &(0x7f0000001800)=[{&(0x7f00000003c0)="7801a2f9552b4307ea890ac68e9cbdc43f9abc801ff08ed209bb65cd2678e60cb584f1", 0x23, 0xe91}, {&(0x7f0000000400)="108cc36e317eeb6889e5744cf92a42fe20966ef3cc17d787b15899b893bf27b4df475e512293f9aff5cf7db145c6bd3201d0b6c46a8dd0978160514bf653bbc8b0d7fcb89ffea4fd995372d8fb50d76029e0706bc76e5fd2b207b5d188d3c804a62f0c1d02a0ca3c73e68476c5f6c8bc829a66d988f536c8c76dcf018c7591eec7d9997c969a8b067f0faff8d9a78061304fc26d5c2a4d5e9149f7fc4d0c1af70bf5c8c091a150ca9d10e0b5d82c9278b80232d25c1c9d6d18fd18e407a80962694df681da4481e5075dc49a1051c89f2f12546d", 0xd4, 0x6}, {&(0x7f0000000500)="f354a9b87225fc4ad6fd348aed6d18db1938c87397fcabeb0fb6b187e593becf2003915c62180e7be8e9937dd8551773833fe5db1e927bb9069bf793a7055901f53bcfdaefc536c41d0c8f6c175a3286a1cbcbefb1f2742c6f52faba77f45df9a1d58f3c0cb1ad410cf493133a33b1fa365bdd3b117453f384a72f9b52d33ea415c2b7f0d0426a4289ed23cd5bf6fc5ad40332f6f587c482744341d31f946e51da4df59b9a997790c8192016de88156a7779559cf2e67d8aef4294d20b5cdc26c9e6882877a031b5570114b7ceb2e1", 0xcf, 0x3602}, {&(0x7f0000000600)="59b84475101813e8fc7cd11ad1ab164fc5fe7c0bb7bce4e1cb590e7495d11491a34f170f6b7f65b11e1ef7816ed3fe0d9dcdb22d3aeb34514ff4a88101", 0x3d, 0x3}, {&(0x7f0000000640)="68aa4a91deb8d415779bf468f505049cce3e8fdb4c2501e846984c2cfc267757c7794cbce367284f2e55d84708a585fee273aab5db52c823e8afc5bf06e5985b621d0fab91598c6eb7b4c72bd21aaa06c667b506a2b5b4f2be63c5fe0245740872a2464387b14c9e37c1250393982437478b9e4005b51166b15d0fa0c4ab7eb38fb4ed942be7d63ce515a4083df1c8ee111f96a10b289d6b4f3cfa56e9b8983ed96061cb351e4dc9e2352aede6916c5eceb5221abde85157119c7dc661e769d668b35a406f1b314674a6c02d07952c2af986dd09b0b8ff", 0xd7, 0x80}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="999535310fa6e2e78dd6e9bae9f20b03878142354d3bca9ff1cb373f1dae51b4e2853690ac83eba2a30a8a76064151b93ebad98270319ecf96bd69cd2d7501bf47a603fa467f604ab9e88b8817db4d621979321969793b8745b1f34350a7198d13855094bcc72aad26d8dbcbf91eb33ee94e66177e9d4788c0bbd7c8b676cfdd717a5b60242f3ed48c6ef09d1a1dcbb754ea35f65dd4691fbeb142d7885abfcd1d3701afd2e2a974905e980dd710", 0xae, 0x7}], 0x4000, &(0x7f00000018c0)={[{@mode={'mode', 0x3d, 0x7}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x70, 0x34, 0x6b, 0x37]}}], [{@uid_gt={'uid>', 0xee00}}, {@dont_measure}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) [ 357.345890] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./mnt\x00', 0x0, 0x0, 0x0, 0x3a0c4a0, &(0x7f0000000200)=ANY=[@ANYBLOB="008ad620", @ANYRESHEX=0xee01, @ANYBLOB=',\x00']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000030c0)='mountinfo\x00') stat(&(0x7f00000002c0)='./mnt/file0\x00', &(0x7f0000000240)) preadv(r0, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x7ff, 0x0) 14:46:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:46:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r0, 0x0, 0x200f5ef, 0x0) r5 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$nfs(0x0, 0x0, 0x6, 0x0, &(0x7f0000001400), 0x0, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd, 0x0, 0x0, 0x0, {0xa}, 0x1, {0x0, r7}}, 0x811) openat(r4, &(0x7f0000000180)='./file1\x00', 0x480142, 0x2) openat(r5, &(0x7f0000000240)='./file1\x00', 0x480000, 0x31) sendfile(r6, r0, 0x0, 0x7ffffff9) 14:46:22 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r4, 0xffffffffffffffff, 0x0) 14:46:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000001e00)={0x2cb, 0x5, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) pipe2(0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 14:46:22 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:22 executing program 0: syz_open_dev$mouse(&(0x7f0000000000), 0x1000, 0x10000) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80a1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2, 0x2}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r0, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./mnt\x00', &(0x7f0000000180)='tracefs\x00', 0x0, 0x0) 14:46:22 executing program 2: r0 = syz_io_uring_setup(0x1e, &(0x7f0000000080), &(0x7f0000feb000/0x13000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x23456}, 0x0) io_uring_enter(r0, 0x27a2, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='freezer.self_freezing\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x100, 0x70bd25, 0x9, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x20004001) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x4000, @fd_index=0x8, 0x7, 0x20, 0xafc9, 0x0, 0x0, {0x2}}, 0x7) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x80010, r0, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x1, 0x2c011, r0, 0x10000000) r7 = eventfd(0x8) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x1, 0x0, 0x0, 0x5, 0x6, 0x0, {0x0, 0x0, r7}}, 0x0) rt_sigpending(&(0x7f00000002c0), 0x8) r8 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r8, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r8, 0x4010942a, &(0x7f0000000340)={0x0, 0x9}) [ 357.511520] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 357.536835] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:33 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "0cc721", 0x14, 0x88, 0x0, @private0, @local, {[@srh], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) syz_emit_ethernet(0xd8, &(0x7f0000000080)={@multicast, @remote, @val={@void, {0x8100, 0x4}}, {@generic={0x890d, "f4cb18c9bd3800443629783ec39212582abd0b9328c9423c6c6bf4ee0addc521837db0275e2a3d022dd73b739f967bf775fc789bf5ff449fc1d5a5ef6deb026b9c8ab4b29d4177323f0e2c82df2cb165b9e306543a6d5de70d166335a0942474c11957a5b03ec427435b0477e621b47c28a6047ca8c9c591929ea93354b55b8b3f8c8558843f13e1aaabc441f1144874b6aa709c24945cd281358a2d89708432efdbe5dbaddf23ce21b37e8fe58093676bd11764316d0872009cd2cf6c8c4f75599183ebf704"}}}, &(0x7f0000000180)={0x0, 0x4, [0x1a0, 0xee8, 0xb72, 0xc14]}) 14:46:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:46:33 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02100100032c4f2f17", 0x9, 0x800}, {&(0x7f00000001c0)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x200001, &(0x7f0000012c00)=ANY=[]) getresgid(&(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000600)=0x0) r2 = getgid() fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {0x1, 0x4}, [{}, {0x2, 0x0, 0xee01}, {0x2, 0xc, 0xffffffffffffffff}], {0x4, 0x6}, [{0x8, 0x4, r1}, {0x8, 0x5}, {0x8, 0x1, r2}, {0x8, 0x0, r3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x1, r4}], {0x10, 0x2}, {0x20, 0x6}}, 0x6c, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/14], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='btrfs\x00', 0x108002, &(0x7f0000000140)='$\x00') getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) r6 = geteuid() mount$9p_unix(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0), 0x20000, &(0x7f00000004c0)={'trans=unix,', {[{@dfltgid={'dfltgid', 0x3d, r5}}, {@version_L}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@seclabel}, {@obj_type={'obj_type', 0x3d, 'o\x1a\xf3U\a8\x92\xaf'}}, {@uid_eq={'uid', 0x3d, r6}}, {@pcr={'pcr', 0x3d, 0x7}}, {@context={'context', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@fsname={'fsname', 0x3d, '$\x00'}}]}}) 14:46:33 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:33 executing program 7: open$dir(&(0x7f0000000040)='./file0\x00', 0x48040, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x12, r0, 0x0) fork() perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:46:33 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:46:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000001580)="eb58906d6b66732e66617400020820000200008000f8000020005d00000000000000000001", 0x25}, {0x0, 0x0, 0xffffffffffffc587}], 0x0, &(0x7f00000000c0)=ANY=[]) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x800) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x1a40c2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000540)='T', 0x3f9b}], 0x1) 14:46:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000545000/0x2000)=nil) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0)=0x1, 0x4) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000680)={&(0x7f0000000700)=ANY=[@ANYBLOB="f4050000", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="140002006272696467655f736c6176655f30000014000200627269646765300000000000000000004300030070d4a7d5e62b3e6ea2145788afeae770e0a13a1806c920d3a25a0d7ec7ac30ac3576d2993e38d90388156d8c9493a97aba5fd0fe4f26145fc4a703aef043bc00"], 0x5f4}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0xe1) openat(r3, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x32) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0xc) r5 = syz_open_dev$mouse(&(0x7f0000000140), 0x81, 0x40) renameat(r4, &(0x7f0000000100)='./file0\x00', r5, &(0x7f0000000180)='./file0\x00') io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x0, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x444000, 0x4) 14:46:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 368.922028] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 368.943131] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 69634)! [ 368.945249] EXT4-fs (loop3): group descriptors corrupted! [ 368.957652] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:33 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x11, 0x0, 0x1000007ffe) writev(r0, &(0x7f0000000180)=[{&(0x7f00000009c0)="8a", 0x1}], 0x1) fallocate(r0, 0x22, 0x4, 0x10001) write$P9_RLOCK(r0, 0x0, 0x0) 14:46:33 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x8, &(0x7f0000000800)=[{&(0x7f0000000140)="bcd78319907e8e40c9eb59a885583e600bed5a630985b904ffade9a4e96681cc113a591824dbce8d120f366d3d1d593cbc43ca48131eb9ec83d07ab9af98f930a6959bfa5397c1f9130e4734401b8644264fa0f9886e874d45dc2b258700c4507e8cd277cca8c69f90acfaa85a0eda3e458035f759746fbc6a537efa18ec277c09d4cf78a8612ec184ca108f0f19b3c4e77ac49bad6d4a11c8208abfafb57f68f55d874405519251f780eadebedb817004bb4f", 0xb3, 0x9}, {&(0x7f0000000400)="2dbf22a11b89cfc15d9352ca090eb14800b3c88b0b3c63dc3a4e55ac76455383732bc852e1a675a2fdf1a7b91a7d623231b06d64ee490ef0ff39a0a7e77337e0d3de460c785b5e9dd67e96c86fcfae2708cda78daea367aa8e3495f6a0967e41c1e31401f586dac7cbea7d489fd3aaf612fe3ce553b323f08e08dee5b94c328e56805201f2e26fad2cecb3a33faf29593a4b89c6de2acb70950d1aec979dbff99b3511155862278f49e8840edace70d2a2432335f0acc508c52d57965be5a0286826b66e0ea2487aee09e2da78e8198813503bea6ed1812d9b6ab993", 0xdc, 0x3}, {&(0x7f0000000300)="0c7e51d3d6d59d83ce64d629178a2537a54632829a8e4f4c49bde31f4591e91b7b98c6c25b9f96b3c563be1f8b16d3f91a50bed7250672b0c773a82ed5ffc3bced3afd86cf759f82df3de5c453c7272f3914c1f86c028497f365b263d847ad562280883f80524add711735a3164d32f60afc9ba2e61f55d1760a34601693079da36dcb033285143a9068aa26be128f172a3a1417148cc437962868e23bc21d9ccd163eecd21306be55fcbd053cabb4d3b9f241", 0xb3, 0x98}, {&(0x7f00000005c0)="e3076c34b7799b024e8a268ca82d608819a1218e5076644f81f3536d3e12da7b5a778ca9a40201e61f20ea0926246ef4d796a6430fabcbe613c301289bc6fbb89341c2e9341a14671d27ee017b8d3e602cc066a93a50a4a073cf5e0c0b1ca9b2553c1126fbf6c4be55115bf813e84d8f19eeecf7f5badd46f852f80b2381cd119e862fc020965992a69daed3de88f7733f650fdd70b122774b6a220dcdf106054f1377ddaea2091f80b107d629455d334db60688d89384448ee47e23c570bd12d0d56fd41193cb5dff7a7120da85bc7c60c95b92a8e0d0a83e80dac0b1d5bb2e99e9dae1f9d0afb61506337d52148a9a14", 0xf1}, {&(0x7f0000000200)="eb0cb3aea6c8349dd91bf1c14b1451df998dae6878b607c9f9b0aef9e25be04591831f1d2c3faba14afcb62284d6", 0x2e}, {&(0x7f0000000500)="12bdd08e59b371fc5825f27528", 0xd}, {&(0x7f00000006c0)="e8a736f21a7913ff76a5674bf054f3decb88c85fe585fc2a41da99184d37fc62d17c019d7834ea5b546ce6d98d7c55985f4716a8bccd848369f254f88976f740a45a05980258340234d3830c9b5624efc2192ef218862e", 0x57, 0x3}, {&(0x7f0000000740)="98cd191b5bc184f84de8eef171a31b1e90754a1d23e125a4aecffd51930c64a2c437d181219e55dfe32598438683904928a4cf8a24d06af163712a399383b4917c248548cda666a01dde03bafd969a0ef6c11814f5bbc91bb99a9d27e3057762e2c14252021257a58136ea25c5db6b4aeb0c11fcbde7b637feef5e2573ac161d5c014d", 0x83, 0x6}], 0x10000, &(0x7f00000008c0)={[{@discard}, {@noquota}, {@nojournal_checksum}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3ed}}, {@data_journal}], [{@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/sr0\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) openat(r2, &(0x7f0000000a00)='./file1\x00', 0x4400, 0x100) close(r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 368.998153] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 69634)! [ 369.000180] EXT4-fs (loop3): group descriptors corrupted! 14:46:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000001c0)=""/150) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x101) r2 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0xaf0c, 0x0, 0x0, 0x389, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x3938700}}, 0x0) io_uring_enter(r2, 0x76d3, 0x0, 0x0, 0x0, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r5, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) 14:46:33 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:33 executing program 3: r0 = shmget(0x0, 0x2000, 0x8, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x1000) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) geteuid() stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in=@rand_addr=0x64010101, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@mcast2, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x4) open_tree(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x100) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000500)="b0b59a84f975e0b25a486aecf414a5fddedb6ece0a570ebf5608cdc24d5c3283cc16352c8ee5cab0a9893850a3f6646b49dbaf8271c60cd3899a4206c8d1774da5a5a371922d5d769cbec92687f60fc25bb91b1d4fb949a4b7a14d9d708f4c5c485595fb83d257ab400c726650e44dd855647072768507b0c183bc92f058aa1c58ace0f273e34fcadce8a59bf60c40c51f4308c6b763ad02c216b7a38cd3f7e9c97eb7673a9ee03fa70bcf15307e68b002c2aa0da12f0a154970b884f308a92c2f5a46ca3ed03e41bdf05fe2d47c577faf414db7a0f43db08fa5fabfd0d31128fdddf4cb7ed8f106") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in6=@private0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000280)=0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r5}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) setresuid(r4, r5, 0x0) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f00000004c0)={0x2, 0x0, 0x0, 0x100000a, 0x15, 0x0}) 14:46:33 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000040)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000100)={0x1f, 0x2}) 14:46:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:46:33 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 369.122464] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 14:46:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:46:33 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 369.229526] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:33 executing program 5: setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) lseek(r0, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:33 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:46:33 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x8, &(0x7f0000000800)=[{&(0x7f0000000140)="bcd78319907e8e40c9eb59a885583e600bed5a630985b904ffade9a4e96681cc113a591824dbce8d120f366d3d1d593cbc43ca48131eb9ec83d07ab9af98f930a6959bfa5397c1f9130e4734401b8644264fa0f9886e874d45dc2b258700c4507e8cd277cca8c69f90acfaa85a0eda3e458035f759746fbc6a537efa18ec277c09d4cf78a8612ec184ca108f0f19b3c4e77ac49bad6d4a11c8208abfafb57f68f55d874405519251f780eadebedb817004bb4f", 0xb3, 0x9}, {&(0x7f0000000400)="2dbf22a11b89cfc15d9352ca090eb14800b3c88b0b3c63dc3a4e55ac76455383732bc852e1a675a2fdf1a7b91a7d623231b06d64ee490ef0ff39a0a7e77337e0d3de460c785b5e9dd67e96c86fcfae2708cda78daea367aa8e3495f6a0967e41c1e31401f586dac7cbea7d489fd3aaf612fe3ce553b323f08e08dee5b94c328e56805201f2e26fad2cecb3a33faf29593a4b89c6de2acb70950d1aec979dbff99b3511155862278f49e8840edace70d2a2432335f0acc508c52d57965be5a0286826b66e0ea2487aee09e2da78e8198813503bea6ed1812d9b6ab993", 0xdc, 0x3}, {&(0x7f0000000300)="0c7e51d3d6d59d83ce64d629178a2537a54632829a8e4f4c49bde31f4591e91b7b98c6c25b9f96b3c563be1f8b16d3f91a50bed7250672b0c773a82ed5ffc3bced3afd86cf759f82df3de5c453c7272f3914c1f86c028497f365b263d847ad562280883f80524add711735a3164d32f60afc9ba2e61f55d1760a34601693079da36dcb033285143a9068aa26be128f172a3a1417148cc437962868e23bc21d9ccd163eecd21306be55fcbd053cabb4d3b9f241", 0xb3, 0x98}, {&(0x7f00000005c0)="e3076c34b7799b024e8a268ca82d608819a1218e5076644f81f3536d3e12da7b5a778ca9a40201e61f20ea0926246ef4d796a6430fabcbe613c301289bc6fbb89341c2e9341a14671d27ee017b8d3e602cc066a93a50a4a073cf5e0c0b1ca9b2553c1126fbf6c4be55115bf813e84d8f19eeecf7f5badd46f852f80b2381cd119e862fc020965992a69daed3de88f7733f650fdd70b122774b6a220dcdf106054f1377ddaea2091f80b107d629455d334db60688d89384448ee47e23c570bd12d0d56fd41193cb5dff7a7120da85bc7c60c95b92a8e0d0a83e80dac0b1d5bb2e99e9dae1f9d0afb61506337d52148a9a14", 0xf1}, {&(0x7f0000000200)="eb0cb3aea6c8349dd91bf1c14b1451df998dae6878b607c9f9b0aef9e25be04591831f1d2c3faba14afcb62284d6", 0x2e}, {&(0x7f0000000500)="12bdd08e59b371fc5825f27528", 0xd}, {&(0x7f00000006c0)="e8a736f21a7913ff76a5674bf054f3decb88c85fe585fc2a41da99184d37fc62d17c019d7834ea5b546ce6d98d7c55985f4716a8bccd848369f254f88976f740a45a05980258340234d3830c9b5624efc2192ef218862e", 0x57, 0x3}, {&(0x7f0000000740)="98cd191b5bc184f84de8eef171a31b1e90754a1d23e125a4aecffd51930c64a2c437d181219e55dfe32598438683904928a4cf8a24d06af163712a399383b4917c248548cda666a01dde03bafd969a0ef6c11814f5bbc91bb99a9d27e3057762e2c14252021257a58136ea25c5db6b4aeb0c11fcbde7b637feef5e2573ac161d5c014d", 0x83, 0x6}], 0x10000, &(0x7f00000008c0)={[{@discard}, {@noquota}, {@nojournal_checksum}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3ed}}, {@data_journal}], [{@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/sr0\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) openat(r2, &(0x7f0000000a00)='./file1\x00', 0x4400, 0x100) close(r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:46:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x8, &(0x7f0000000800)=[{&(0x7f0000000140)="bcd78319907e8e40c9eb59a885583e600bed5a630985b904ffade9a4e96681cc113a591824dbce8d120f366d3d1d593cbc43ca48131eb9ec83d07ab9af98f930a6959bfa5397c1f9130e4734401b8644264fa0f9886e874d45dc2b258700c4507e8cd277cca8c69f90acfaa85a0eda3e458035f759746fbc6a537efa18ec277c09d4cf78a8612ec184ca108f0f19b3c4e77ac49bad6d4a11c8208abfafb57f68f55d874405519251f780eadebedb817004bb4f", 0xb3, 0x9}, {&(0x7f0000000400)="2dbf22a11b89cfc15d9352ca090eb14800b3c88b0b3c63dc3a4e55ac76455383732bc852e1a675a2fdf1a7b91a7d623231b06d64ee490ef0ff39a0a7e77337e0d3de460c785b5e9dd67e96c86fcfae2708cda78daea367aa8e3495f6a0967e41c1e31401f586dac7cbea7d489fd3aaf612fe3ce553b323f08e08dee5b94c328e56805201f2e26fad2cecb3a33faf29593a4b89c6de2acb70950d1aec979dbff99b3511155862278f49e8840edace70d2a2432335f0acc508c52d57965be5a0286826b66e0ea2487aee09e2da78e8198813503bea6ed1812d9b6ab993", 0xdc, 0x3}, {&(0x7f0000000300)="0c7e51d3d6d59d83ce64d629178a2537a54632829a8e4f4c49bde31f4591e91b7b98c6c25b9f96b3c563be1f8b16d3f91a50bed7250672b0c773a82ed5ffc3bced3afd86cf759f82df3de5c453c7272f3914c1f86c028497f365b263d847ad562280883f80524add711735a3164d32f60afc9ba2e61f55d1760a34601693079da36dcb033285143a9068aa26be128f172a3a1417148cc437962868e23bc21d9ccd163eecd21306be55fcbd053cabb4d3b9f241", 0xb3, 0x98}, {&(0x7f00000005c0)="e3076c34b7799b024e8a268ca82d608819a1218e5076644f81f3536d3e12da7b5a778ca9a40201e61f20ea0926246ef4d796a6430fabcbe613c301289bc6fbb89341c2e9341a14671d27ee017b8d3e602cc066a93a50a4a073cf5e0c0b1ca9b2553c1126fbf6c4be55115bf813e84d8f19eeecf7f5badd46f852f80b2381cd119e862fc020965992a69daed3de88f7733f650fdd70b122774b6a220dcdf106054f1377ddaea2091f80b107d629455d334db60688d89384448ee47e23c570bd12d0d56fd41193cb5dff7a7120da85bc7c60c95b92a8e0d0a83e80dac0b1d5bb2e99e9dae1f9d0afb61506337d52148a9a14", 0xf1}, {&(0x7f0000000200)="eb0cb3aea6c8349dd91bf1c14b1451df998dae6878b607c9f9b0aef9e25be04591831f1d2c3faba14afcb62284d6", 0x2e}, {&(0x7f0000000500)="12bdd08e59b371fc5825f27528", 0xd}, {&(0x7f00000006c0)="e8a736f21a7913ff76a5674bf054f3decb88c85fe585fc2a41da99184d37fc62d17c019d7834ea5b546ce6d98d7c55985f4716a8bccd848369f254f88976f740a45a05980258340234d3830c9b5624efc2192ef218862e", 0x57, 0x3}, {&(0x7f0000000740)="98cd191b5bc184f84de8eef171a31b1e90754a1d23e125a4aecffd51930c64a2c437d181219e55dfe32598438683904928a4cf8a24d06af163712a399383b4917c248548cda666a01dde03bafd969a0ef6c11814f5bbc91bb99a9d27e3057762e2c14252021257a58136ea25c5db6b4aeb0c11fcbde7b637feef5e2573ac161d5c014d", 0x83, 0x6}], 0x10000, &(0x7f00000008c0)={[{@discard}, {@noquota}, {@nojournal_checksum}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3ed}}, {@data_journal}], [{@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/sr0\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) openat(r2, &(0x7f0000000a00)='./file1\x00', 0x4400, 0x100) close(r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 369.387349] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 369.399565] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 369.443665] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 14:46:34 executing program 5: setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) lseek(r0, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 369.472398] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:34 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r2, 0xffffffffffffffff, 0x0) [ 369.604567] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:44 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r2, 0xffffffffffffffff, 0x0) 14:46:44 executing program 2: setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) lseek(r0, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:44 executing program 1: setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) lseek(r0, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:46:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x8, &(0x7f0000000800)=[{&(0x7f0000000140)="bcd78319907e8e40c9eb59a885583e600bed5a630985b904ffade9a4e96681cc113a591824dbce8d120f366d3d1d593cbc43ca48131eb9ec83d07ab9af98f930a6959bfa5397c1f9130e4734401b8644264fa0f9886e874d45dc2b258700c4507e8cd277cca8c69f90acfaa85a0eda3e458035f759746fbc6a537efa18ec277c09d4cf78a8612ec184ca108f0f19b3c4e77ac49bad6d4a11c8208abfafb57f68f55d874405519251f780eadebedb817004bb4f", 0xb3, 0x9}, {&(0x7f0000000400)="2dbf22a11b89cfc15d9352ca090eb14800b3c88b0b3c63dc3a4e55ac76455383732bc852e1a675a2fdf1a7b91a7d623231b06d64ee490ef0ff39a0a7e77337e0d3de460c785b5e9dd67e96c86fcfae2708cda78daea367aa8e3495f6a0967e41c1e31401f586dac7cbea7d489fd3aaf612fe3ce553b323f08e08dee5b94c328e56805201f2e26fad2cecb3a33faf29593a4b89c6de2acb70950d1aec979dbff99b3511155862278f49e8840edace70d2a2432335f0acc508c52d57965be5a0286826b66e0ea2487aee09e2da78e8198813503bea6ed1812d9b6ab993", 0xdc, 0x3}, {&(0x7f0000000300)="0c7e51d3d6d59d83ce64d629178a2537a54632829a8e4f4c49bde31f4591e91b7b98c6c25b9f96b3c563be1f8b16d3f91a50bed7250672b0c773a82ed5ffc3bced3afd86cf759f82df3de5c453c7272f3914c1f86c028497f365b263d847ad562280883f80524add711735a3164d32f60afc9ba2e61f55d1760a34601693079da36dcb033285143a9068aa26be128f172a3a1417148cc437962868e23bc21d9ccd163eecd21306be55fcbd053cabb4d3b9f241", 0xb3, 0x98}, {&(0x7f00000005c0)="e3076c34b7799b024e8a268ca82d608819a1218e5076644f81f3536d3e12da7b5a778ca9a40201e61f20ea0926246ef4d796a6430fabcbe613c301289bc6fbb89341c2e9341a14671d27ee017b8d3e602cc066a93a50a4a073cf5e0c0b1ca9b2553c1126fbf6c4be55115bf813e84d8f19eeecf7f5badd46f852f80b2381cd119e862fc020965992a69daed3de88f7733f650fdd70b122774b6a220dcdf106054f1377ddaea2091f80b107d629455d334db60688d89384448ee47e23c570bd12d0d56fd41193cb5dff7a7120da85bc7c60c95b92a8e0d0a83e80dac0b1d5bb2e99e9dae1f9d0afb61506337d52148a9a14", 0xf1}, {&(0x7f0000000200)="eb0cb3aea6c8349dd91bf1c14b1451df998dae6878b607c9f9b0aef9e25be04591831f1d2c3faba14afcb62284d6", 0x2e}, {&(0x7f0000000500)="12bdd08e59b371fc5825f27528", 0xd}, {&(0x7f00000006c0)="e8a736f21a7913ff76a5674bf054f3decb88c85fe585fc2a41da99184d37fc62d17c019d7834ea5b546ce6d98d7c55985f4716a8bccd848369f254f88976f740a45a05980258340234d3830c9b5624efc2192ef218862e", 0x57, 0x3}, {&(0x7f0000000740)="98cd191b5bc184f84de8eef171a31b1e90754a1d23e125a4aecffd51930c64a2c437d181219e55dfe32598438683904928a4cf8a24d06af163712a399383b4917c248548cda666a01dde03bafd969a0ef6c11814f5bbc91bb99a9d27e3057762e2c14252021257a58136ea25c5db6b4aeb0c11fcbde7b637feef5e2573ac161d5c014d", 0x83, 0x6}], 0x10000, &(0x7f00000008c0)={[{@discard}, {@noquota}, {@nojournal_checksum}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3ed}}, {@data_journal}], [{@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/sr0\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) openat(r2, &(0x7f0000000a00)='./file1\x00', 0x4400, 0x100) close(r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:46:45 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:46:45 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:46:45 executing program 5: setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) lseek(r0, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 380.379320] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 380.403299] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 380.409560] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 380.467104] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 380.471350] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 380.481782] EXT4-fs (loop4): mount failed [ 380.518225] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:46:57 executing program 1: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:57 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:46:57 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:46:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x8, &(0x7f0000000800)=[{&(0x7f0000000140)="bcd78319907e8e40c9eb59a885583e600bed5a630985b904ffade9a4e96681cc113a591824dbce8d120f366d3d1d593cbc43ca48131eb9ec83d07ab9af98f930a6959bfa5397c1f9130e4734401b8644264fa0f9886e874d45dc2b258700c4507e8cd277cca8c69f90acfaa85a0eda3e458035f759746fbc6a537efa18ec277c09d4cf78a8612ec184ca108f0f19b3c4e77ac49bad6d4a11c8208abfafb57f68f55d874405519251f780eadebedb817004bb4f", 0xb3, 0x9}, {&(0x7f0000000400)="2dbf22a11b89cfc15d9352ca090eb14800b3c88b0b3c63dc3a4e55ac76455383732bc852e1a675a2fdf1a7b91a7d623231b06d64ee490ef0ff39a0a7e77337e0d3de460c785b5e9dd67e96c86fcfae2708cda78daea367aa8e3495f6a0967e41c1e31401f586dac7cbea7d489fd3aaf612fe3ce553b323f08e08dee5b94c328e56805201f2e26fad2cecb3a33faf29593a4b89c6de2acb70950d1aec979dbff99b3511155862278f49e8840edace70d2a2432335f0acc508c52d57965be5a0286826b66e0ea2487aee09e2da78e8198813503bea6ed1812d9b6ab993", 0xdc, 0x3}, {&(0x7f0000000300)="0c7e51d3d6d59d83ce64d629178a2537a54632829a8e4f4c49bde31f4591e91b7b98c6c25b9f96b3c563be1f8b16d3f91a50bed7250672b0c773a82ed5ffc3bced3afd86cf759f82df3de5c453c7272f3914c1f86c028497f365b263d847ad562280883f80524add711735a3164d32f60afc9ba2e61f55d1760a34601693079da36dcb033285143a9068aa26be128f172a3a1417148cc437962868e23bc21d9ccd163eecd21306be55fcbd053cabb4d3b9f241", 0xb3, 0x98}, {&(0x7f00000005c0)="e3076c34b7799b024e8a268ca82d608819a1218e5076644f81f3536d3e12da7b5a778ca9a40201e61f20ea0926246ef4d796a6430fabcbe613c301289bc6fbb89341c2e9341a14671d27ee017b8d3e602cc066a93a50a4a073cf5e0c0b1ca9b2553c1126fbf6c4be55115bf813e84d8f19eeecf7f5badd46f852f80b2381cd119e862fc020965992a69daed3de88f7733f650fdd70b122774b6a220dcdf106054f1377ddaea2091f80b107d629455d334db60688d89384448ee47e23c570bd12d0d56fd41193cb5dff7a7120da85bc7c60c95b92a8e0d0a83e80dac0b1d5bb2e99e9dae1f9d0afb61506337d52148a9a14", 0xf1}, {&(0x7f0000000200)="eb0cb3aea6c8349dd91bf1c14b1451df998dae6878b607c9f9b0aef9e25be04591831f1d2c3faba14afcb62284d6", 0x2e}, {&(0x7f0000000500)="12bdd08e59b371fc5825f27528", 0xd}, {&(0x7f00000006c0)="e8a736f21a7913ff76a5674bf054f3decb88c85fe585fc2a41da99184d37fc62d17c019d7834ea5b546ce6d98d7c55985f4716a8bccd848369f254f88976f740a45a05980258340234d3830c9b5624efc2192ef218862e", 0x57, 0x3}, {&(0x7f0000000740)="98cd191b5bc184f84de8eef171a31b1e90754a1d23e125a4aecffd51930c64a2c437d181219e55dfe32598438683904928a4cf8a24d06af163712a399383b4917c248548cda666a01dde03bafd969a0ef6c11814f5bbc91bb99a9d27e3057762e2c14252021257a58136ea25c5db6b4aeb0c11fcbde7b637feef5e2573ac161d5c014d", 0x83, 0x6}], 0x10000, &(0x7f00000008c0)={[{@discard}, {@noquota}, {@nojournal_checksum}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3ed}}, {@data_journal}], [{@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/sr0\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) openat(r2, &(0x7f0000000a00)='./file1\x00', 0x4400, 0x100) close(r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:46:57 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:46:57 executing program 5: stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:46:57 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 393.286042] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:57 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 393.326873] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:46:58 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendto$inet(r0, 0x0, 0x0, 0x20000890, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000400)=""/263, 0x107}], 0x1, 0xfffff800, 0x0) sendto$inet(r1, &(0x7f0000000100)="75969216c81499798b07ca9173d6068e62e73945a076b006ce62c18496219eed196fb0afd326853fc569ff99e175f17af98c8480fb69d59ab63cbacb6a42e026f382dd5875a97535693be65411600b16a6c4b52eecb6ce27e763b2a309eb6848c64c62de086a70d85d70382f5ac0ed51f2e5f92dd0c82f94fe5378b96217dfcb80abeff6331ed0691566d8f638c5065d1c0f322a8845f4a6eda87a", 0x9b, 0x800, &(0x7f00000001c0)={0x2, 0x4e20, @local}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pread64(r1, &(0x7f0000000540)=""/4096, 0x1000, 0x7) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f00000000c0)={0x7fdf, 0x10, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0]}) [ 393.361516] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 393.383147] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 14:46:58 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x8, &(0x7f0000000800)=[{&(0x7f0000000140)="bcd78319907e8e40c9eb59a885583e600bed5a630985b904ffade9a4e96681cc113a591824dbce8d120f366d3d1d593cbc43ca48131eb9ec83d07ab9af98f930a6959bfa5397c1f9130e4734401b8644264fa0f9886e874d45dc2b258700c4507e8cd277cca8c69f90acfaa85a0eda3e458035f759746fbc6a537efa18ec277c09d4cf78a8612ec184ca108f0f19b3c4e77ac49bad6d4a11c8208abfafb57f68f55d874405519251f780eadebedb817004bb4f", 0xb3, 0x9}, {&(0x7f0000000400)="2dbf22a11b89cfc15d9352ca090eb14800b3c88b0b3c63dc3a4e55ac76455383732bc852e1a675a2fdf1a7b91a7d623231b06d64ee490ef0ff39a0a7e77337e0d3de460c785b5e9dd67e96c86fcfae2708cda78daea367aa8e3495f6a0967e41c1e31401f586dac7cbea7d489fd3aaf612fe3ce553b323f08e08dee5b94c328e56805201f2e26fad2cecb3a33faf29593a4b89c6de2acb70950d1aec979dbff99b3511155862278f49e8840edace70d2a2432335f0acc508c52d57965be5a0286826b66e0ea2487aee09e2da78e8198813503bea6ed1812d9b6ab993", 0xdc, 0x3}, {&(0x7f0000000300)="0c7e51d3d6d59d83ce64d629178a2537a54632829a8e4f4c49bde31f4591e91b7b98c6c25b9f96b3c563be1f8b16d3f91a50bed7250672b0c773a82ed5ffc3bced3afd86cf759f82df3de5c453c7272f3914c1f86c028497f365b263d847ad562280883f80524add711735a3164d32f60afc9ba2e61f55d1760a34601693079da36dcb033285143a9068aa26be128f172a3a1417148cc437962868e23bc21d9ccd163eecd21306be55fcbd053cabb4d3b9f241", 0xb3, 0x98}, {&(0x7f00000005c0)="e3076c34b7799b024e8a268ca82d608819a1218e5076644f81f3536d3e12da7b5a778ca9a40201e61f20ea0926246ef4d796a6430fabcbe613c301289bc6fbb89341c2e9341a14671d27ee017b8d3e602cc066a93a50a4a073cf5e0c0b1ca9b2553c1126fbf6c4be55115bf813e84d8f19eeecf7f5badd46f852f80b2381cd119e862fc020965992a69daed3de88f7733f650fdd70b122774b6a220dcdf106054f1377ddaea2091f80b107d629455d334db60688d89384448ee47e23c570bd12d0d56fd41193cb5dff7a7120da85bc7c60c95b92a8e0d0a83e80dac0b1d5bb2e99e9dae1f9d0afb61506337d52148a9a14", 0xf1}, {&(0x7f0000000200)="eb0cb3aea6c8349dd91bf1c14b1451df998dae6878b607c9f9b0aef9e25be04591831f1d2c3faba14afcb62284d6", 0x2e}, {&(0x7f0000000500)="12bdd08e59b371fc5825f27528", 0xd}, {&(0x7f00000006c0)="e8a736f21a7913ff76a5674bf054f3decb88c85fe585fc2a41da99184d37fc62d17c019d7834ea5b546ce6d98d7c55985f4716a8bccd848369f254f88976f740a45a05980258340234d3830c9b5624efc2192ef218862e", 0x57, 0x3}, {&(0x7f0000000740)="98cd191b5bc184f84de8eef171a31b1e90754a1d23e125a4aecffd51930c64a2c437d181219e55dfe32598438683904928a4cf8a24d06af163712a399383b4917c248548cda666a01dde03bafd969a0ef6c11814f5bbc91bb99a9d27e3057762e2c14252021257a58136ea25c5db6b4aeb0c11fcbde7b637feef5e2573ac161d5c014d", 0x83, 0x6}], 0x10000, &(0x7f00000008c0)={[{@discard}, {@noquota}, {@nojournal_checksum}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3ed}}, {@data_journal}], [{@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/sr0\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) openat(r1, &(0x7f0000000a00)='./file1\x00', 0x4400, 0x100) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 393.429668] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 393.431390] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 393.431515] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 393.436088] EXT4-fs (loop4): mount failed 14:46:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) chdir(&(0x7f0000000040)='./file1\x00') fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x804}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x6) socket$nl_generic(0x10, 0x3, 0x10) 14:46:58 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:46:58 executing program 5: stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 393.494368] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 393.514493] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 393.574424] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 393.623658] EXT4-fs (loop1): Unrecognized mount option "./file1" or missing value [ 393.672282] EXT4-fs (loop1): Unrecognized mount option "./file1" or missing value 14:47:09 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:09 executing program 1: mknod$loop(&(0x7f0000001d40)='./file0\x00', 0x6000, 0x1) acct(&(0x7f0000000040)='./file0\x00') 14:47:09 executing program 5: stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:09 executing program 2: stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:09 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:09 executing program 6: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:09 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x8, &(0x7f0000000800)=[{&(0x7f0000000140)="bcd78319907e8e40c9eb59a885583e600bed5a630985b904ffade9a4e96681cc113a591824dbce8d120f366d3d1d593cbc43ca48131eb9ec83d07ab9af98f930a6959bfa5397c1f9130e4734401b8644264fa0f9886e874d45dc2b258700c4507e8cd277cca8c69f90acfaa85a0eda3e458035f759746fbc6a537efa18ec277c09d4cf78a8612ec184ca108f0f19b3c4e77ac49bad6d4a11c8208abfafb57f68f55d874405519251f780eadebedb817004bb4f", 0xb3, 0x9}, {&(0x7f0000000400)="2dbf22a11b89cfc15d9352ca090eb14800b3c88b0b3c63dc3a4e55ac76455383732bc852e1a675a2fdf1a7b91a7d623231b06d64ee490ef0ff39a0a7e77337e0d3de460c785b5e9dd67e96c86fcfae2708cda78daea367aa8e3495f6a0967e41c1e31401f586dac7cbea7d489fd3aaf612fe3ce553b323f08e08dee5b94c328e56805201f2e26fad2cecb3a33faf29593a4b89c6de2acb70950d1aec979dbff99b3511155862278f49e8840edace70d2a2432335f0acc508c52d57965be5a0286826b66e0ea2487aee09e2da78e8198813503bea6ed1812d9b6ab993", 0xdc, 0x3}, {&(0x7f0000000300)="0c7e51d3d6d59d83ce64d629178a2537a54632829a8e4f4c49bde31f4591e91b7b98c6c25b9f96b3c563be1f8b16d3f91a50bed7250672b0c773a82ed5ffc3bced3afd86cf759f82df3de5c453c7272f3914c1f86c028497f365b263d847ad562280883f80524add711735a3164d32f60afc9ba2e61f55d1760a34601693079da36dcb033285143a9068aa26be128f172a3a1417148cc437962868e23bc21d9ccd163eecd21306be55fcbd053cabb4d3b9f241", 0xb3, 0x98}, {&(0x7f00000005c0)="e3076c34b7799b024e8a268ca82d608819a1218e5076644f81f3536d3e12da7b5a778ca9a40201e61f20ea0926246ef4d796a6430fabcbe613c301289bc6fbb89341c2e9341a14671d27ee017b8d3e602cc066a93a50a4a073cf5e0c0b1ca9b2553c1126fbf6c4be55115bf813e84d8f19eeecf7f5badd46f852f80b2381cd119e862fc020965992a69daed3de88f7733f650fdd70b122774b6a220dcdf106054f1377ddaea2091f80b107d629455d334db60688d89384448ee47e23c570bd12d0d56fd41193cb5dff7a7120da85bc7c60c95b92a8e0d0a83e80dac0b1d5bb2e99e9dae1f9d0afb61506337d52148a9a14", 0xf1}, {&(0x7f0000000200)="eb0cb3aea6c8349dd91bf1c14b1451df998dae6878b607c9f9b0aef9e25be04591831f1d2c3faba14afcb62284d6", 0x2e}, {&(0x7f0000000500)="12bdd08e59b371fc5825f27528", 0xd}, {&(0x7f00000006c0)="e8a736f21a7913ff76a5674bf054f3decb88c85fe585fc2a41da99184d37fc62d17c019d7834ea5b546ce6d98d7c55985f4716a8bccd848369f254f88976f740a45a05980258340234d3830c9b5624efc2192ef218862e", 0x57, 0x3}, {&(0x7f0000000740)="98cd191b5bc184f84de8eef171a31b1e90754a1d23e125a4aecffd51930c64a2c437d181219e55dfe32598438683904928a4cf8a24d06af163712a399383b4917c248548cda666a01dde03bafd969a0ef6c11814f5bbc91bb99a9d27e3057762e2c14252021257a58136ea25c5db6b4aeb0c11fcbde7b637feef5e2573ac161d5c014d", 0x83, 0x6}], 0x10000, &(0x7f00000008c0)={[{@discard}, {@noquota}, {@nojournal_checksum}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3ed}}, {@data_journal}], [{@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/sr0\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 405.157513] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 405.196493] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 405.206210] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 405.232825] EXT4-fs (loop4): mount failed [ 405.234111] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 14:47:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, &(0x7f00000016c0)=[{&(0x7f00000000c0)=""/137, 0x89}, {&(0x7f0000000240)=""/85, 0x55}, {&(0x7f0000000200)=""/38, 0x26}, {&(0x7f0000001740)=""/144, 0x90}, {&(0x7f0000000300)=""/225, 0xe1}, {&(0x7f0000000080)=""/36, 0x24}, {&(0x7f0000000440)=""/133, 0x85}, {&(0x7f0000001e00)=""/4086, 0xff6}], 0x8, &(0x7f0000000500)=""/263, 0x107}, 0x12044) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, &(0x7f0000000180)) fallocate(r1, 0x3, 0x0, 0x1) 14:47:09 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:09 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000300)="17000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000004014d64f469f3a3fbbe", 0x62, 0x400}], 0x0, &(0x7f0000000180)) r0 = getegid() setgid(r0) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1000000, &(0x7f0000000380)={'trans=unix,', {[{@privport}, {@cachetag={'cachetag', 0x3d, '%'}}, {@version_L}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@access_user}, {@access_client}, {@cachetag={'cachetag', 0x3d, 'ext4\x00'}}, {@mmap}], [{@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}, {@uid_gt={'uid>', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x30, 0x64, 0x38, 0x61, 0x66, 0x32, 0x38], 0x2d, [0x36, 0x31, 0x30, 0x66], 0x2d, [0x35, 0x38, 0x64, 0x30], 0x2d, [0x62, 0x0, 0x66, 0x2], 0x2d, [0x66, 0x6, 0x0, 0x32, 0x66, 0x66, 0x30, 0x64]}}}]}}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x260001, 0x0) 14:47:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {0x0, 0x0, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:10 executing program 5: stat(&(0x7f0000000100)='./file0\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) lseek(r0, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:10 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) [ 405.403386] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:47:10 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 405.519762] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 405.527389] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 405.543037] EXT4-fs (loop4): mount failed 14:47:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {0x0, 0x0, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:20 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:20 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:20 executing program 1: unshare(0x60040000) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000040)={'veth1_macvtap\x00', {0x2, 0x0, @private}}) pipe(&(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00'}) unshare(0x20000800) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x4008, 0x3) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x4000000) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f00000002c0)="20bfa700000080000000060000006a00c2b0c87f0000000000000100010001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4ad6853c4655f0000000000001e0001000000000000000b0000000001", 0xffffffffffffff53, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f00000001c0)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0xcb) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f00000000c0)) r4 = socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, r4, &(0x7f0000000340)=0x4, 0x2) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x3035, @mcast1, 0x9}, 0x1c) 14:47:20 executing program 5: stat(&(0x7f0000000100)='./file0\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) lseek(r0, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000300)="17000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000004014d64f469f3a3fbbe", 0x62, 0x400}], 0x0, &(0x7f0000000180)) r0 = getegid() setgid(r0) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1000000, &(0x7f0000000380)={'trans=unix,', {[{@privport}, {@cachetag={'cachetag', 0x3d, '%'}}, {@version_L}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@access_user}, {@access_client}, {@cachetag={'cachetag', 0x3d, 'ext4\x00'}}, {@mmap}], [{@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}, {@uid_gt={'uid>', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x30, 0x64, 0x38, 0x61, 0x66, 0x32, 0x38], 0x2d, [0x36, 0x31, 0x30, 0x66], 0x2d, [0x35, 0x38, 0x64, 0x30], 0x2d, [0x62, 0x0, 0x66, 0x2], 0x2d, [0x66, 0x6, 0x0, 0x32, 0x66, 0x66, 0x30, 0x64]}}}]}}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x260001, 0x0) 14:47:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:20 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 416.026716] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 416.028902] EXT4-fs (loop4): mount failed 14:47:20 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:20 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:20 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 416.089193] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 14:47:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {0x0, 0x0, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:20 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:20 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:20 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 416.310713] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 14:47:31 executing program 1: unshare(0x60040000) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000040)={'veth1_macvtap\x00', {0x2, 0x0, @private}}) pipe(&(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00'}) unshare(0x20000800) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x4008, 0x3) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x4000000) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f00000002c0)="20bfa700000080000000060000006a00c2b0c87f0000000000000100010001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4ad6853c4655f0000000000001e0001000000000000000b0000000001", 0xffffffffffffff53, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f00000001c0)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r3, 0x0, 0xcb) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f00000000c0)) r4 = socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, r4, &(0x7f0000000340)=0x4, 0x2) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x3035, @mcast1, 0x9}, 0x1c) 14:47:31 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:31 executing program 5: stat(&(0x7f0000000100)='./file0\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) lseek(r0, 0x0, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {0x0, 0x0, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:31 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:31 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00), 0x0, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:32 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 427.392777] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 14:47:32 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 427.400786] EXT4-fs (loop4): mount failed [ 427.444269] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 427.513530] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 14:47:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:43 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:43 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r1, 0x0, 0x0) r2 = openat(r1, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x7, 0x1, &(0x7f0000003180)=[{&(0x7f00000000c0)="4ad6689d49bcfa7b4df990344a5718d6f1b0168f173c3c0d2d343d9a7efce07d51d0cf89c2bfce042d", 0x29}], 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x9049}) 14:47:43 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00), 0x0, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:43 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:43 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) [ 439.209463] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 439.222481] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 439.230145] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 439.234610] EXT4-fs (loop4): mount failed 14:47:43 executing program 7: mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:43 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:43 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:47:43 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:44 executing program 7: mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:44 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r2, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) accept4$inet6(r2, &(0x7f00000015c0)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000080)=0x1c, 0x80000) sendmsg$inet6(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001300)="d689879a53e2d7d250db88aac071ff43014993f653868686af2558c3d99ce24f3b6b00ac5f171f17462a8ad157a279f7aa639756527b82192e88b8962eeb067addd26cb6eea4df68ca2e1560200372e81a550ca3fb52e5006eb1fcb41991976242066118f01e769d1740fd7fc0c4e8ebc5ea6cbceefa5a6b618718d888f2eaecd74a97fd4a2df068f99c7bad9b69cfa8a2976fb73c9da900f15ed10651fd2233096a9e6dafeb1e4bfdb5353f733aa980f53f266a9941dc03fb946362f951d204c4a4c46c9429562f", 0xc8}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000100)="0418edaadf0ea7bc3dbe66f1122e6e3a86d559ad3fd0a776a3cbd14c108b965a17a814d1f32e67be01013fa4d195c9ea4ab430d4ad1773a987a900bd90db6ad1f0c824612f775fb636e91c44a69f271583f65509a2d3389004b1311892798d2cd485", 0x62}, {&(0x7f0000000180)="3d54be8e3963c1d850c70ca7aa54bfd494801a6c4e56891cced356f09287da155368923716bff1c482712749445817bd99bcfdb989207285bd526602c1033c64e84d3fbb3ee2b628b85f0975e862fedf82ec9dd1a29dc28c66fa145caec541861d9b0a9f3f6f74a41880a78bfb8fcede566ca9ca0070a999b5d12546a7cb1c27fe955807e350630c34185c27246efe1dfc286ed647db166b96cf41f0bd5015d71dd8aa6ce4d8ff594f9711fac0885d0e1a17b14ff62f9ee655e92140e420fe83851e1d19a85aa6acc1b2ca57362b0f42e9c3b9d0876263449eb0a087f29b8e0cf671733b282654410a560af9c138216a038d280f346d", 0xf6}, {&(0x7f0000001600)="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", 0x118}, {&(0x7f0000001400)="70bb01e0d6916dc095603d3b6b9384109a6d5b22e76b172f12bfcae676258031692608237cb3a5e583e1e77beaea2edd56197b80894f0c5fc6be61b68a92e6e2d8895a7d03dc2acf2810145f4d65bc19c262c9b88264bcfbc37680d0ab3e3e87e6b2f46f64de51fc4c073cd8c608da4587b9bea3be07a77d13f4a0f72d964feced71860acc968386d178abc4399bbb3b86df9041501fc357", 0x98}], 0x6, &(0x7f0000001540)}, 0x4000000) getsockopt$inet6_int(r1, 0x29, 0x1, 0x0, &(0x7f00000002c0)) 14:47:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00), 0x0, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 439.534337] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 439.536640] EXT4-fs (loop4): mount failed 14:47:55 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:47:55 executing program 1: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:55 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a09", 0xb, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00), 0x0, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:55 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:55 executing program 7: mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 450.541239] __quota_error: 20 callbacks suppressed [ 450.541268] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 450.547038] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 450.574607] EXT4-fs (loop4): mount failed [ 450.575489] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 450.578566] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 14:47:55 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:55 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:47:55 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:47:55 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) listen(r0, 0x0) sync() r1 = syz_open_dev$mouse(&(0x7f00000000c0), 0x4, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x18, &(0x7f0000000080), 0x4) fcntl$dupfd(r1, 0x0, r2) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x18, &(0x7f0000000080), 0x4) fcntl$setsig(r4, 0xa, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x26}, 0x1}, 0x1c) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x18, &(0x7f0000000080), 0x4) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140), 0x4) r7 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400000, 0x0) dup2(r6, r7) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000040)) 14:47:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a09", 0xb, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:47:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:47:55 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:47:55 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:47:55 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r2, 0xffffffffffffffff, 0x0) [ 450.832785] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 450.874331] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 14:48:08 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) listen(r0, 0x0) sync() r1 = syz_open_dev$mouse(&(0x7f00000000c0), 0x4, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x18, &(0x7f0000000080), 0x4) fcntl$dupfd(r1, 0x0, r2) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x18, &(0x7f0000000080), 0x4) fcntl$setsig(r4, 0xa, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x26}, 0x1}, 0x1c) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x18, &(0x7f0000000080), 0x4) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140), 0x4) r7 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400000, 0x0) dup2(r6, r7) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000040)) 14:48:08 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:48:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a09", 0xb, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:48:08 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:48:08 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:48:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a09", 0xb, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:48:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:08 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r2, 0xffffffffffffffff, 0x0) [ 464.005715] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 464.008055] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 464.016603] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 464.022606] EXT4-fs (loop4): mount failed [ 464.056541] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 14:48:08 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 464.074149] EXT4-fs warning (device loop1): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 464.088176] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 464.107840] EXT4-fs (loop1): mount failed 14:48:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a0900", 0x10, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:48:08 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:48:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:08 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 464.236527] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 464.244493] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 14:48:08 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 464.293560] EXT4-fs (loop4): mount failed 14:48:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a09", 0xb, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:48:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 464.377005] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 464.445827] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 14:48:23 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) listen(r0, 0x0) sync() r1 = syz_open_dev$mouse(&(0x7f00000000c0), 0x4, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x18, &(0x7f0000000080), 0x4) fcntl$dupfd(r1, 0x0, r2) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x18, &(0x7f0000000080), 0x4) fcntl$setsig(r4, 0xa, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x26}, 0x1}, 0x1c) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x18, &(0x7f0000000080), 0x4) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140), 0x4) r7 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400000, 0x0) dup2(r6, r7) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r3, 0x8010661b, &(0x7f0000000040)) 14:48:23 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:48:23 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:48:23 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x15, 0x80) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKSECTGET(r0, 0xc0481273, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x3) 14:48:23 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:48:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a0900", 0x10, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:48:23 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 478.523657] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:48:23 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 478.582373] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 478.584256] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). 14:48:23 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 478.588102] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 478.592157] EXT4-fs (loop4): mount failed 14:48:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a0900", 0x10, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 478.637176] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 14:48:23 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 478.744828] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 478.746004] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 478.750966] EXT4-fs (loop4): mount failed 14:48:35 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:48:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:35 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:48:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a0900000000", 0x13, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:48:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:35 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x0, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:48:35 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:48:35 executing program 1: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) [ 490.840426] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 490.843254] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 490.849883] EXT4-fs (loop4): mount failed [ 490.881962] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 490.895840] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 490.995861] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 14:48:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a0900000000", 0x13, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:48:35 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 491.058712] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:48:35 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:48:35 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:48:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:35 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x0, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:48:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 491.160032] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 491.168844] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 491.169078] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 491.175310] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 491.192986] EXT4-fs (loop4): mount failed 14:48:35 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:48:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:48 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:48:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:48 executing program 1: syz_emit_ethernet(0x7e, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c20000001c9b09c8430a0800450000700000000000019078ac1414bbac1414aa0c00907800000000450000000000000000060000ac1414bbe0000001081c00000000000000000000000000fffffffffffffffa0000000000831300e0000002ac1e0001e0000002e0000001000e1985e24ebf4e86200019296a000000"], 0x0) 14:48:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a0900000000", 0x13, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:48:48 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, 0x0, 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:48:48 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x0, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:48:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736672d59600088001000240000004f801002000400000000000000000008000"/64, 0x40}, {&(0x7f0000010100)="f8ffff00f0ffffffffffffff00"/32, 0x20, 0x800}, {&(0x7f0000010200)="f8ffff00f0ffffffffffffff00"/32, 0x20, 0x1000}, {&(0x7f0000010300)="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", 0x120, 0x1800}, {&(0x7f0000010500)="2e2020202020202020202010000eeb70325132510000eb7032510300000000002e2e20202020202020202010000eeb70325132510000eb70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020000eeb70325132510000eb70325104001a040000", 0x80, 0x42000}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x82000}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0xc2000}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x142000}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 504.094291] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 504.096305] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 504.097965] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 14:48:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 504.104704] EXT4-fs (loop4): mount failed 14:48:48 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, 0x0, 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:48:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:48:48 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000000)=0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) 14:48:48 executing program 2: r0 = fsmount(0xffffffffffffffff, 0x1, 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400), 0x420, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000002280)={0x1390, r2, 0x400, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_BEACON_HEAD={0x5fd, 0xe, {@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x6}, @device_b, @broadcast, @initial, {0x1, 0x4}}, 0xfa4d, @default, 0x490, @void, @void, @val={0x3, 0x1, 0x74}, @void, @val={0x6, 0x2, 0xad5}, @void, @val={0x25, 0x3, {0x1, 0x6, 0x1}}, @void, @void, @val={0x2d, 0x1a, {0x20, 0x0, 0x7, 0x0, {0x69, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x2}, 0x400, 0x9, 0x24}}, @void, @val={0x71, 0x7, {0x1, 0x1, 0xffffffffffffffff, 0x0, 0x2, 0x1f, 0x1}}, @val={0x76, 0x6, {0x0, 0x6, 0x1a, 0x7}}, [{0xdd, 0xef, "649096da3f69caca056d4d420b62b9c170f8606fd96008047fd02a398aaa5af25e7ee9475281362bb2e01c2d83e9b474dd3a61d295c0f7f75ed7bd159a2b35c5b59d1b87b5689b815d275e3853cd2c25a7a4599ae8e989fe8bf349a5bcc9aba2a522536f5326564ccfef54f27c4178de3dbaf4bb3021f2f243bdd49534dd324d33b987f78e9820e66481681f7f0f992e80fcdf045fd515e0f2af390e236687746e159639a311167bb5edeb27ba02196d1581fe9a33188b32ad28a88e2bc6c5cbc22b82fb82acd8b6a3d5682497e12fbe72c81e8a3e5e9996d4bdade3c4081834bca4d6a18d43ec82dffd24c575cf64"}, {0xdd, 0x7d, "2e28341059c566a0f8d8b33ddc80204e6fe6f5d1be0ec51696e6009f72e8cc9bc847531a7aec26cb6aa71a17f4606eab2418ba2186404f0ee994f89ed393e34e6a991150702b2168deaf7db89c9bb24eb2ff913a72f84f4ccd767c9855920500b9a6443790d357f35cbf6213508f0963609c6d2f43e7b6798dd488a1d0"}, {0xdd, 0x5f, "44d2848710e3671506e21db682e5f92aa37a1d0466cdf678c7902f0a318ac9e102ea11043f1c4bafa573a237a31895235f4cd27377a7d8cad725cf9791376b977ee05dedf763a16869662e2d2c8586aac2254cbde8e8b583f11c1396baafc2"}, {0xdd, 0x5a, "f21ad1127c31ca9cd6b67250cc00d57bf457a313928929bb570daadf830379154f7da054c2ff1f949edcab03521c3aa9e3fe4e4a4e3d96a241ddf7f0d337cd9e76f6d917d70696b7fbcdae6d698ba74eacb552455dd126a5bb19"}, {0xdd, 0x72, "3372eb8c5f92db6bee5b8d9dd97cd1da9b21b6d3ac4daf8370ffa16b3a7a6e87de24ad16c08d1ec2cd5f6ea37c29b9239bdbf8100f019541a43668221cd5c1876ad239fd7633c3b8e1b3187fe2942f0d059e9654bab3c3c3834389cbd12a5f205afd383a14fcc4a5b48d62bb64d0e627e569"}, {0xdd, 0x9e, "859d44a9e7f940ce5d4abcefbe47355b71039b217094ef7a39375abe07d107b33ac652f55ae6a7a70c6a3f7a66f3463eb02ca68a1826f945e3ed684a0921a213013593e4504aab70e5f24cab043551093796c3cb974d21df8218f4193c1d2666f85641ae26d997b84ac08550b76ec26e30fc72f7ccc16906a9b91b55334f4a4fac7ded402b2e992b8c21358815e5ad464c26030bb4ebadd34e4bd5add4ff"}, {0xdd, 0xaf, "71d88f2d331acd4db4d05c02aee11eea71acb844024d45e41b901a91bbfd132d7d4bd13bbb42dcd7fd70988b0c253c111fb5d4d002396b52f40dff028871cafec8042641551374e71caa477ae9ec7b70a7ec8c6be98a75260e5298d1bb0bf8c88b50535274158512e9b9bda887903a9054e506d9e08bbcd5dae785f9aadbbadfb95696e1e8d6308bd364ae73fedbb95b1c004cdec688cd5f37b124fd8b1632b3ce5ad6f6f69fcfe7c3e58dde22e6b7"}, {0xdd, 0xd0, "b34f7c48b3de47bb9abcf7c5197ed5cf533458b3600e1665f654ece22e128bfb2861ab4c507f167c446cac828c5b83b782d1a275abb75276787d789eafe6c4e5d42ba233c041686dddaed3598e73ad0c4c10722a09fa10f7d6e6e08badefe380dc91a068490d905e67ad1c8b2c767943287d28f6f835c009558e9e918b581897a1dc58d7789c2a8d0594e3f583f7ac0ca7a46e1a47312ad0adcf6b341b25e22f4ce43858f3814f887a16abf7d7a8c9b110609af167e4b317edb072fa990a1dc99abfaa145507c33dd06b4875032bab56"}, {0xdd, 0xd6, "13e05823b66bcbaf60256a1c6128aeb8dc01e50b7b58210b04093c5159deaf2cc70cf957b2d24f4ec2247ccfcda471f82452ad0706009ce4b2a6541577c1f0e61e8991d6388fd289953b1058eda75acb10af2ebd83ce81fc3b8fe365d059f98850076a0f475377de970febed5f22702c2f1384332451139f2f725c337369452b439efbbcd6f5bbd280704e00cbcf1970e1ce8623ca1b71c1d99cbcf179c181c7098a66e252e5d1805689a2aa3cfb09304075dac9ef175b2c34e5460bdb5b251fe2a34ac789ad5f911b2f98f370b15b31d0d6ac0210f7"}]}}, @NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_BEACON_HEAD={0x2dd, 0xe, {@with_ht={{{0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x5}, @broadcast, @broadcast, @initial, {0xc, 0x5}}, @ver_80211n={0x0, 0x2, 0x0, 0x3, 0x0, 0x1}}, 0x63, @default, 0x80, @void, @void, @void, @void, @val={0x6, 0x2, 0x4}, @val={0x5, 0x92, {0x40, 0x9b, 0xd5, "b2741b1dd80f749b16eed8d89e77cde61add314f41da6b473d97ef3fe7acd6e0f2e3451c3e9490e8ac63d7931f8e0644e6ac6ef7633eea4eb6f5278263a47cb2ac7c9667c74e5e277ddb5fc811f17438acdab2a3fa6d7fcdb34a29c55814614fe83184ba2476d83be38a2698796049cf014e0c4844cf8bf51f91c3e84f17902808d3a6778d130ed3784a9407aabce7"}}, @void, @void, @void, @val={0x2d, 0x1a, {0x10, 0x3, 0x0, 0x0, {0x6, 0x2, 0x0, 0x7, 0x0, 0x1, 0x1}, 0x400, 0x100, 0x9e}}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x81, 0x1}}, @void, [{0xdd, 0x2a, "c952434aca2e6efcaf41f3baf858d5c1263b32301a1bdd8079d73968e5daa2e1e0898c3cad888aacf66f"}, {0xdd, 0xf3, "64daf66b39ad63d9a5cfa25c953c365651e3c9f6c4ed26dc3ef9df45ba3bccb714c1b9b39b18177268af271389dfb361ffcce5ae8e4e73d37bc908d72e29b36b36aea6cbd9b65506a780c31c334227ad99ae142486caafb910adb0be8e0b9a06c0913e5cd114086a54a7b36bc17aab26b1e45777f3f3d723befc53fb622aec6e821165d7c65ae69888083e437569ec07287ebe774117d04b49d4c76b81d87bf20e26827c7fbf1d1d892bc4078c43bdf598b06ba1fed4e1951d4ce8ab3a12f0b36e137c6efed36d5bb2990d878ea79b4331ccf07af61c8ab6ceee0691e29fda74e9df46712949ca245b1aab60f4b2a5963a6f6f"}, {0xdd, 0x33, "8ee3051263d24d47f39ec656854e76ffcda8cd11c86f4236493f6acbc5d9b7d860d7f4c2a7b2d13052242f2a8141c4aa07030e"}, {0xdd, 0x94, "b0027964a653a866897b0afbb785eebba4718c163992ec73b4d2341f42732d46c27ddfa892b9124b488c63d19d0e47117b5bbf020c62bf0598bf77896bb4a71e3d5bbfe53086e953bd20fd3aee0ecb2944fc5d364d4a5eb8c0c3f5262f0740228658497e316b617d68ee63b93eff95525148e2379c30287a5fa49e6e086584b002d5b8469295d9d325d43c6aeaecf77d7d476b4d"}]}}, @NL80211_ATTR_BEACON_TAIL={0x81, 0xf, [@random_vendor={0xdd, 0x7b, "9cd1b15362531c63e67810c211e4913ac82017a568f82215b2c6ee9c0e1aea2490997e951e9e68ea1d66c9e6093a651fa518674c4602b8b975cca71e02e67ee4302e1b08ffb7395c08aca78e135f072b85e56c152b597552fe6c676df5b477d1d939f4bb5f88037b35f4d3840e7535720a3e7cad6bfbd13a687ae3"}]}, @NL80211_ATTR_PROBE_RESP={0x7cc, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0x243, 0x91, "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"}]}, 0x1390}, 0x1, 0x0, 0x0, 0x40004}, 0x880) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = clone3(&(0x7f0000000280)={0x28000000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140), {0x3d}, &(0x7f0000000180)=""/20, 0x14, &(0x7f00000001c0)=""/123, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) read(r5, &(0x7f0000000000)=""/60, 0x3c) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000940)={0x630, 0x13, 0x1, 0x0, 0x0, {0x7}, [@generic="5e79b6eae97845033b7c38be700d7dfed6e0c0f705ff86175439529dcdf6a080bba3aaca6d0d48c0e4905651ce8ad5aec65d4384b86db7cc674785351c3e35cc1f26", @generic="64cc9041e44690ffdfa1db4715db81b14f96da7be3d4dad68a07915efab2f3c1585ec20d3f1fcb06b0dd669d12f27aa6473541ece38b28fa699b9ffb7c27e18c7a101b9738741196b9bdfd6d634259a76753b832abb51a6d26ab3be71de3e0aa51efb34fee061e8007d82973c26d43a25736c5c90a46e23540d14c72489aee67bfac97182e8e682e984d7782b4302e67c52a", @generic="3677c0bdf7c2bef5ad4ea88dc2421b709f7c83db58c3aa96ac4959370ec5cf83cbe95cdb9ad1cd5686d2eb4070236f559754480c4c46077d352a5f96480f04acd8bbf9f3f407053da8c800072f81570b219507dd120e819cb7150f97ce4e0b1a656a3be44f17ae2daf539cfe4f833783fe9de5074a33d075c992cafa2cc789e67ceb5b7c9c53138684ac1bc22af35aacfadcd778dde00d13079f370f54d5c4526aaf4ed076ccf8241645a0dc4c3ac1c0e7da3e50ebaa2c428ecbea34d02f78bb7b65b817947152d63d0afe96f660437685f5f40e1c", @generic, @typed={0x8, 0x66, 0x0, 0x0, @ipv4=@empty}, @generic="1b62637bc01111e654970191b5ef50bf1e96a1c4d9d6efcc0459ade45001b42578f89e314df312fd3ed7c7f9a674dc7abd60f64cf26a3ad269dc73fa2d5317f89e44100b402cb9fd16b75908767a0515d5e7630f88d527c430937bbc466955b3216bf0c9471dff7dba3009c9bb102f74e277c0ac92b221ee9707808d05e381020a027ba6abc5f6f13aa076e927a77470ceaa478d3f1689f11a965f182c4aa8ad875fb20b10fd6744c1a5edf8d97b7233d37e8aaba1da7e2cad4ac8d378", @typed={0x8, 0x63, 0x0, 0x0, @pid=r4}, @nested={0x340, 0x0, 0x0, 0x1, [@typed={0xaf, 0x86, 0x0, 0x0, @binary="b102fef4727c916b2c54ebcce600221bd5f46e274115ef67a14d6e1768d2a005850626bdb35944eda5e25cfa5d9d0a473ca5ba28d9875d7ad356c6d965e1e7684205f6c344f8ed99d9c3ec4dafc34e23bb20ee555299c21309bdec09e350d3b6f43405d5b332f1c6c07dce242130204d6fd4cd928e138b5be5c98e17ae535cb2b5709479bd24fc5184f874caf6a19687fe6285de886fdf6b65735126e3b2bf49532002141c7d9ee1ede080"}, @generic="23318a4e4352a6e5867a353acded0b7bcedb54cb85e01c893b2e6ad99045ce02dbe0377fe4dc0b63a7ed80998d501b5b7e4df791aaa6f7e1ad06620bda73b18487cc1e3ef428d45ddbad8eaea48a044e0a2516360ac414a0089c6622f536e5f8ecc3bfdb4cbbe156d7812d5bb1ea56eb056c29a3a6ce06fb129f445472d036fbe5499c43a94d530a5134bb2cfe73a9fdc9e1656552e59a1ecd13e23bc95da77953eb4a5a458aa38929820ae3508827f9abedf2ae007d1214bee26402828221a9063244ac7a2b973b9cf78c85177d12b8a9a7366e010eb8affcc12c", @generic="9cdf6e6eab31162c73cb890e49b259b01f5d2627b672032b25d5ba267392d47c0766539dbd44264659f11c5462279c491043fc12c992ced0578967888438b57499d071c016f4416f07c3fdabfc15211e85e48bccfacddffd09550c5575df", @typed={0x7, 0x23, 0x0, 0x0, @str='!$\x00'}, @generic="3cdba97c213e60d9c27845740fa977475e00000000000000b8b6d91b3b2d248153a1ef0a066c431c67d32e089e671e6083d54a0800000068d07998975529905fb9b872d380becc7ce10e76d6270e4327a1a1d531b2a31eb00636b8d7be0d007c6c404b7b794f341734e3c1c40ac4658a70ab600000ef35ed06d7c041759347e9b8e5118ea0dc1d2ab621177f37d79568290a65eb7d3af193f300000000000000", @typed={0x4, 0x5c}, @generic="3238289f95ec801bd7df8c3c609060f204bc765f276038be8d02bdbaadad27472c99325a2ecdd8b0dc3cc69a8bce24c1470c6a55bfab696fe3edef92ebc9d7ece1410803973c1f69f4abd61b16cdd5ff3aa5a70ff550ec758b675615738724a114a7dd982547b32fd7cd479fbd1d29dac7fbb8ae2b6dfb6d3623ab82cd088e79a2511bf55d5762899176d5d6a5633100c72abd07d983ed716c078feb457222ad54c4549d395d83"]}, @generic="9bae215812f06ceba0f48d1f8cf82ec23930b8c2bb0f952876172d3d2a7acd472bf2c626c78c468634776db0d6cb1bcc28a3cf4cc68d115aa2628d48fda2ead5dab3e244dbf63631479778101d9366645f7d0e817afb4ecb06430f20dd5894d3201ca31bc40c"]}, 0x630}}, 0x0) 14:48:48 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:48:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000", 0x14, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:48:48 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x0, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 504.251329] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 504.315680] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 504.318323] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 504.331442] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 504.334740] EXT4-fs (loop4): mount failed [ 504.384558] audit: type=1326 audit(1628347729.053:49): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6187 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 14:49:00 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, 0x0, 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:49:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:00 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:49:00 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x0, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:49:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000", 0x14, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000", 0x14, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) connect$packet(r0, &(0x7f0000000040)={0x11, 0xc, 0x0, 0x1, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}, 0x14) r1 = syz_usb_connect$cdc_ecm(0x6, 0x74, &(0x7f0000000440)=ANY=[@ANYBLOB="12011003020000402505a1a4400001020301090262000101f780990904000102020600810b24060000e302236201b205240009000d240f0102000000ab00ffff8007240a7f3f81960424020406241ab400050724147000730009058103000202021f09058202ff03070533975803024000400907a2fed7868bd8d3d350bfaee9ed4750e9a2beef9bc0cef1364bb9710ed75cc50d398dcdcc77e0ad8a89885ecdb5618e9eb68bd721c04aa619ba4095ffa5e10637c4cab00b67b06568828d13cc44"], &(0x7f0000000100)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x300, 0x8, 0x80, 0x8, 0xff, 0x4}, 0x5, &(0x7f00000000c0)={0x5, 0xf, 0x5}}) syz_usb_connect$printer(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xff, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x40, 0x20, 0x96, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x7, 0x1, 0x1, 0x40, "", {{{0x9, 0x5, 0x1, 0x2, 0x200, 0xff, 0xff, 0x4}}, [{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x0, 0x40}}]}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x310, 0x1, 0x81, 0x1, 0x40, 0xa1}, 0x19, &(0x7f00000005c0)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0x0, "b86cfe487b3cf336f0819fb1cce3aa21"}]}, 0x8, [{0x36, &(0x7f0000000600)=@string={0x36, 0x3, "6216235c29f6118b35a56690c10f36101f95e1574fb6d5f60e48a4db51809b90d5bc7b73cd3be66d208e464fdcd476c6ebe38f4f"}}, {0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x446}}, {0x4, &(0x7f0000000680)=@lang_id={0x4, 0x3, 0x80c}}, {0x7c, &(0x7f00000006c0)=@string={0x7c, 0x3, "f2f951707c5184550585ad366a6be9852cce25488531ec5e559267901e318c2ee11dee53e18074ba8074436a2a38bce4006f5d91494f62994b13dcf1e5a6db8671c7f831fe1c55d57fc3d30ccd1747c908ba8f1fb23ab2ed09598c19c52406671b0aefd7b46447f1ca21f5c54a8ed66f775bedace63c7f578d31"}}, {0x4, &(0x7f0000000740)=@lang_id={0x4, 0x3, 0x420}}, {0x4, &(0x7f0000000780)=@lang_id={0x4, 0x3, 0x449}}, {0x4, &(0x7f00000007c0)=@lang_id={0x4, 0x3, 0x4001}}, {0x57, &(0x7f0000000800)=@string={0x57, 0x3, "efbc717dcd2c3ee73d5dd881c063ae37264e5bc17ff83cc69032462f018bfc1febdd719b6883d18411f29294ddeddbf3b627f06bcc8902be4e7e46d3a798ca9e4e7b4ae7e18684804e0f7252cd8456273c60cee21c"}}]}) syz_usb_control_io$cdc_ecm(r1, &(0x7f0000000280)={0x14, &(0x7f0000000140)={0x20, 0xd, 0xc1, {0xc1, 0x30, "a764ed2f6e5490aa59658e10f2b9d9f39524ed236a977b6a0d14b9033e69e172b558c2fb57b5f2ea3500cd702f6b9cc5d0bfb422f393ded3926683226b6cdd9a3818dd69b1c54c1503e4dc13fa9dd0c4e7f62619b202ad1e4877a4013151a2e97bc7fcc1cbe55e93bc92783e16dda9c2f998899d9e9560c2ce8b3f85b314e41be9a855f57b1fef005118f10a4503e1f475e9fd0d7d0977aab9f9f2d4d69b078c4f6d0f69045c8d2a50cbe4be87c6f0ae28050030c81218e4b82c176a78eb40"}}, &(0x7f0000000240)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000400)={0x1c, &(0x7f00000002c0)=ANY=[@ANYBLOB="4000b0000000ddea9e4f12c30902a0c0d289149b9343dd6039186c5641e0f1fca08fdec8b72ffd702df0e00811bc2616bb6a960e0255ab29532ecb95bece6a2a56389c8e53a569d826d88d1e9809183195f390198f65c9534fcabe81d64f5e98b9851efc7b85add73dbcf32fa4d798314ed5cfc1c5f3738f53bd17d074109ce52c55c796f72c91b986d354923ffe687d9bec781ba73b899d235c81fc1959e543662563bfa41c50ae05ca6586c97755a1a6fd5a53055b"], &(0x7f0000000380)={0x0, 0xa, 0x1, 0x7f}, &(0x7f00000003c0)={0x0, 0x8, 0x1}}) 14:49:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 516.209264] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:49:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 516.245706] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 516.247360] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 516.253164] EXT4-fs (loop4): mount failed 14:49:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000", 0x14, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x114, 0x0, 0xa80, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0xf0, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20a88b93}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5e624c39}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4dbff820}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7313e8a9}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x37}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x583995fd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xad}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40fc66e7}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd6}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49cc3155}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2133b2b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x54}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x68}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5169a3f5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x114}, 0x1, 0x0, 0x0, 0x801d4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000680), r0) syz_genetlink_get_family_id$nbd(&(0x7f0000000740), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000005940)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000005900)={&(0x7f0000005880)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) 14:49:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:12 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:49:12 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x0, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:49:12 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r3, 0xffffffffffffffff, 0x0) 14:49:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:12 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x0, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 528.178358] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 528.196862] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 528.210770] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 528.220110] EXT4-fs (loop4): mount failed 14:49:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:12 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:49:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:12 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r2, 0xffffffffffffffff, 0x0) [ 528.345896] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:49:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:13 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:49:13 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x0, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 528.426754] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 528.455405] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 528.460410] EXT4-fs (loop4): mount failed 14:49:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:49:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:25 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:49:25 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000140)={@local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "96153f", 0x38, 0x3a, 0x0, @rand_addr=' \x01\x00', @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "773389", 0x0, 0x32, 0x0, @ipv4={'\x00', '\xff\xff', @local}, @private0, [], "419b5152d873bf82"}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}, @broadcast, @val={@val={0x9100, 0x2, 0x1, 0x1}, {0x8100, 0x2, 0x0, 0x4}}, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x4, @broadcast, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}}, &(0x7f0000000080)={0x0, 0x1, [0xdba, 0xc56, 0xd86, 0xd18]}) 14:49:25 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r2, 0xffffffffffffffff, 0x0) 14:49:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:25 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x0, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:49:25 executing program 1: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x48002, 0x0) r1 = accept4$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x40000) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x6, @local}, 0x10) bind$packet(r1, &(0x7f00000002c0)={0x11, 0x17, r5, 0x1, 0xe1, 0x6, @random="b44970238fd0"}, 0x14) r6 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr(r6, &(0x7f0000000040)=@known='user.incfs.id\x00', &(0x7f0000000080)='/dev/hpet\x00', 0xa, 0x1) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x1b, r2, 0x1, 0x9, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3d}}, 0x14) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r7, 0x40182103, &(0x7f0000000140)={0x0, 0x0, r6, 0x537}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r6, 0x40089413, &(0x7f0000000180)=0x5ad) bind$unix(r7, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6, 0x4000010, r7, 0x10000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000380)) syz_io_uring_submit(0x0, r8, &(0x7f0000000340)=@IORING_OP_READ=@pass_buffer={0x16, 0x3, 0x4000, @fd_index=0x5, 0xfff, 0x0, 0x0, 0x11}, 0x5) syz_io_uring_setup(0x3e0f, &(0x7f0000000480)={0x0, 0x75d8, 0x1, 0x2, 0x12f}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000500), &(0x7f0000000540)) [ 541.079351] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 541.084027] EXT4-fs (loop4): mount failed [ 541.112828] device lo entered promiscuous mode [ 541.126812] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:49:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 541.130795] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:49:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:25 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:25 executing program 2: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r2, 0xffffffffffffffff, 0x0) [ 541.237769] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:49:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:25 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x0, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 541.271616] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:49:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 541.285266] device lo left promiscuous mode [ 541.291708] device lo entered promiscuous mode 14:49:25 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:49:25 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:49:25 executing program 2: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x0, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 541.358029] device lo left promiscuous mode [ 541.362376] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 14:49:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:26 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = mq_open(&(0x7f0000000180)=',!(\x00', 0x800, 0x82, &(0x7f00000001c0)={0x800, 0x9, 0x0, 0xffffffffffff638a}) close_range(r1, r0, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') mq_getsetattr(r1, &(0x7f00000027c0)={0x4, 0x2, 0x7, 0xba}, 0x0) preadv(r3, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000700)={{0x3, 0x80}, {0x2, 0x81}, 0x6, 0x3, 0x81}) preadv(r2, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000002800), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000080)={0x2, 0x9, 0x0, 'queue1\x00', 0x1ff}) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x8880) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000002940)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002980)={&(0x7f0000002880)={0x58, 0x3, 0x3, 0x101, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff}}, @NFQA_MARK={0x8}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x9}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x5}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3f}]}, 0x58}, 0x1, 0x0, 0x0, 0x40080}, 0xc1cf255fc9b21328) writev(r4, &(0x7f0000000580)=[{&(0x7f0000000240)="a52affd3843537403c98622c4ed42da29e1ba134c2", 0x15}, {&(0x7f0000000280)="12b4898eaabf889d2572daa73707789f1878b01abab3528cf2fda16ea6690785209a3e7d1bf5ca3a3da91af8344a5e8b218adf256deaa6b98cb3488074de804ea1c6556e35bfe64745", 0x49}, {&(0x7f0000000400)="04bcc3560b6265871a", 0x9}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f0000000440)="d8244a1f2c5c7c6c18ba50b236fdd06dcb126623f3dac1b3322bd17bc6e34b65e287c05affa9236342b63a9d9308d4cedff95710b3fad391ca08129fb731cf9b5baddd63a44d08b74bda4b224b61acb0a9e58d22155bfacb9286cb1b83e7de06b5ddb6a29f2b1908dc534fdb545a7604388553870d51528aade518edb82747200cde59b9f85fa8c04223f017ed74a04c94946fd0a1", 0x95}, {&(0x7f0000000500)="1b2fc9ad6a4504a5504bd1fe6eca3db9c38487fe5947278000f3b188139d0e177d10e4459e69f98850304ccbbaaf5b80b6c385b6d8b90b25c8cdc0ce865008e1afd293ab22bdd60be193d1622f4b55d7a62607ce9bb7a13e5279297a290027b7b0918cbca099b132b44f0e1bb9589136431c0db90f0670c4a3d1cc94f614ba", 0x7f}, {&(0x7f00000017c0)="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", 0x1000}], 0x7) r5 = fcntl$dupfd(r0, 0x406, r0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000600), 0xa201, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000640)={{0x34, 0x4}, 'port1\x00', 0x28, 0x0, 0x2, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x1f}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000140)=0x2) flistxattr(r5, 0x0, 0x0) [ 541.415609] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:49:26 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x0, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 541.428564] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:49:26 executing program 1: socket$inet(0x2, 0x1, 0x3) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="a7", 0xfffffd6b, 0x0) read(r0, &(0x7f00000001c0)=""/140, 0x8c) socket$inet(0x2, 0x3, 0xff) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0xfffffffffffff800) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0xfffffffd, @private2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r1, &(0x7f0000000700)=""/4096, 0xe34e, 0xcd08, 0x0, 0x6b4) readv(r1, &(0x7f00000002c0)=[{&(0x7f00000012c0)=""/181, 0xb5}, {0x0}], 0x2) 14:49:26 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x0, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:49:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0xe34e, 0xcd08, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000680)={'syztnl0\x00', &(0x7f0000001780)={'ip6tnl0\x00', 0x0, 0x2f, 0x0, 0x3, 0x8001, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, @private1, 0x70f, 0xd9dbc1b7b7e77593, 0x3, 0xffff}}) sendmsg$inet6(r0, &(0x7f0000001880)={&(0x7f0000000040)={0xa, 0x4e23, 0x20, @mcast1}, 0x1c, &(0x7f0000001700)=[{&(0x7f0000000100)="d2a816cc849ac5bd231724106262aa88253b4ca8295720c825790011afbb1074261a42d46ae885113aadb7f6cfc211cc8965f25bb3e91d61ccc64949702180c22fddbf4bcf9589410de0a821aee0857f4bd4bddb486ecb9e93d9275b49914bdfa168d223bd9f797b32e5d03f0c86fa20c401f0c98d1e30a75e6f48e4cbac42632243434d9cc41a284e196ab22ce532e92efea763c4ef447c7dd5e4", 0x9b}, {&(0x7f0000000200)="7773dc5de8973677d6149a3162f3f5a7dc7366f06c9f03edd537d8784f67e90b9ec695ee3355e262560bcae7fd34d06bf323b038a4f13177435e8a5e0447ef12e98327d43ef3c5681766421e97bab1e625809a159c9e95593917f3855d46b028156dcc7e3ef7a285e458e036fde30e54e72c3f898e8c9152281eda90b30e9273ee9581e7576a3cfed994cdd72f2328801b2080b9a2354436f60cdd4c8cfa77b854d72c5940f2bd484cd67953de1b7f12a0b40b7e7e37608b2123a81a23fe3685faef60d17adf6cf40ee99b35b406a444f6674d4ce3c6c60f7eabeb68b275d48930", 0xe1}, {&(0x7f0000000300)="2b0c1b0af9458d1f00474c118f1480d5f4e6c2114c74251c991805c73470a7e2795cd05263785f407686f9ed4313b633f53828a126cb151d721a977eb93e5d048f02df89721ca1546d726d211a51d1a434147aa26823072e9f695bcfe4", 0x5d}, {&(0x7f0000000380)="0e2b809279408ddf346f617c957fe54ffb14c4214da2885c6a6eca1001cc240b403c5e21362dc2d865491bf3dc2e3b2a4538d3a083ff3ab52310caf08e7940c27308d847fccde9b6ab473986062a51b5ce22f9115c833771ab61bd84bd88154edfac41402304fe561c44d57a7e3dfb47623f4cea18155e4355497fafad725c214a02d12548443acd2b8560e00e1f2bad79a4378dbd33629b4763c2b4b91c818f204dae4b20b958a35f8138e556b9015ab8dff6386c", 0xb5}, {&(0x7f0000000440)="687069ccd3bff13f20c47b4b525954cd3e48f98a47804465bdc1cb9bf0f651869cbf1745cce47b8856b2d8a11d58b0e55d7ea0929e7e3f4dce1c211030d08ce939391eb0853c9415f2d1d994cab73d72e1cc4e8eb91256ab18d31ac40ef61671f8ad50d8f072ddcde6318c9a36e8d4ea505f15a78367bc90aa442933590fa5123f4e54bab9711d6f80289b2aab4de738e9f37cbe143eb2e5b3a5801ca5872ceefd9a59230a2dff90a8938b11779ea1cf2b5d47e205579db1ed74067a57168a5c9ccc6ceae74bbc3a3f04c53043f94c5c27649d67dcedfc", 0xd7}, {&(0x7f0000000580)="54fa4423d5eedbbef84f768f068318b6a210218b0a91be6fe3ded539d524c56484a458fe05e59ed6398cbd8313414c7628430fe519ebf2e8830a80de3d7077814f9c6ffb7477cc74cdf37aa851bf442ab6d9848c2c068d40040dac19305f4e1cc1574d09c0635b3108d02d06dc6b5ae9271a55beef8c31854aadc4051289fbb4e22609f0d3d78be79483ff60f5cf07e9257d3d6e378cf8f29b94eca6a5d2060fd3b2654b054604e7decfe6e16b4b9289cd9b50fa641384ad6f6f0b8b165284fbca044db27c87a145c3601518f4c1103337f95d3267605d5f17eea3f0", 0xdc}], 0x6, &(0x7f0000001800)=[@pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x2e}, r1}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @dontfrag={{0x14}}], 0x58}, 0x0) [ 541.490060] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 14:49:26 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:49:26 executing program 6 (fault-call:5 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:26 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:26 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0x0, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 541.649832] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 541.669224] FAULT_INJECTION: forcing a failure. [ 541.669224] name failslab, interval 1, probability 0, space 0, times 1 [ 541.671994] CPU: 1 PID: 6375 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 541.673471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 541.675931] Call Trace: [ 541.676625] dump_stack+0x107/0x163 [ 541.677413] should_fail.cold+0x5/0xa [ 541.678229] ? __alloc_skb+0x6d/0x620 [ 541.679059] should_failslab+0x5/0x10 [ 541.679869] kmem_cache_alloc_node+0x55/0x370 [ 541.680863] ? do_raw_spin_lock+0x121/0x260 [ 541.681790] __alloc_skb+0x6d/0x620 [ 541.682578] tcp_send_fin+0x1be/0xbb0 [ 541.683416] tcp_close+0xb34/0x1200 [ 541.684243] inet_release+0xe9/0x1f0 [ 541.685043] inet6_release+0x4c/0x70 [ 541.685834] __sock_release+0xd2/0x290 [ 541.686669] sock_close+0x18/0x20 [ 541.687439] __fput+0x285/0x980 [ 541.688176] ? __sock_release+0x290/0x290 [ 541.689074] task_work_run+0xe2/0x1a0 [ 541.689898] exit_to_user_mode_prepare+0x155/0x160 [ 541.690963] syscall_exit_to_user_mode+0x38/0x230 [ 541.692006] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 541.693130] RIP: 0033:0x466609 [ 541.693818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 541.697838] RSP: 002b:00007f25e4277188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 541.699480] RAX: 0000000000000000 RBX: 000000000056bf80 RCX: 0000000000466609 [ 541.701045] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000003 [ 541.702581] RBP: 00007f25e42771d0 R08: 0000000000000000 R09: 0000000000000000 [ 541.704155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 541.705681] R13: 00007ffd41f71a8f R14: 00007f25e4277300 R15: 0000000000022000 [ 541.749372] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 554.523504] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:49:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0xe34e, 0xcd08, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000680)={'syztnl0\x00', &(0x7f0000001780)={'ip6tnl0\x00', 0x0, 0x2f, 0x0, 0x3, 0x8001, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, @private1, 0x70f, 0xd9dbc1b7b7e77593, 0x3, 0xffff}}) sendmsg$inet6(r0, &(0x7f0000001880)={&(0x7f0000000040)={0xa, 0x4e23, 0x20, @mcast1}, 0x1c, &(0x7f0000001700)=[{&(0x7f0000000100)="d2a816cc849ac5bd231724106262aa88253b4ca8295720c825790011afbb1074261a42d46ae885113aadb7f6cfc211cc8965f25bb3e91d61ccc64949702180c22fddbf4bcf9589410de0a821aee0857f4bd4bddb486ecb9e93d9275b49914bdfa168d223bd9f797b32e5d03f0c86fa20c401f0c98d1e30a75e6f48e4cbac42632243434d9cc41a284e196ab22ce532e92efea763c4ef447c7dd5e4", 0x9b}, {&(0x7f0000000200)="7773dc5de8973677d6149a3162f3f5a7dc7366f06c9f03edd537d8784f67e90b9ec695ee3355e262560bcae7fd34d06bf323b038a4f13177435e8a5e0447ef12e98327d43ef3c5681766421e97bab1e625809a159c9e95593917f3855d46b028156dcc7e3ef7a285e458e036fde30e54e72c3f898e8c9152281eda90b30e9273ee9581e7576a3cfed994cdd72f2328801b2080b9a2354436f60cdd4c8cfa77b854d72c5940f2bd484cd67953de1b7f12a0b40b7e7e37608b2123a81a23fe3685faef60d17adf6cf40ee99b35b406a444f6674d4ce3c6c60f7eabeb68b275d48930", 0xe1}, {&(0x7f0000000300)="2b0c1b0af9458d1f00474c118f1480d5f4e6c2114c74251c991805c73470a7e2795cd05263785f407686f9ed4313b633f53828a126cb151d721a977eb93e5d048f02df89721ca1546d726d211a51d1a434147aa26823072e9f695bcfe4", 0x5d}, {&(0x7f0000000380)="0e2b809279408ddf346f617c957fe54ffb14c4214da2885c6a6eca1001cc240b403c5e21362dc2d865491bf3dc2e3b2a4538d3a083ff3ab52310caf08e7940c27308d847fccde9b6ab473986062a51b5ce22f9115c833771ab61bd84bd88154edfac41402304fe561c44d57a7e3dfb47623f4cea18155e4355497fafad725c214a02d12548443acd2b8560e00e1f2bad79a4378dbd33629b4763c2b4b91c818f204dae4b20b958a35f8138e556b9015ab8dff6386c", 0xb5}, {&(0x7f0000000440)="687069ccd3bff13f20c47b4b525954cd3e48f98a47804465bdc1cb9bf0f651869cbf1745cce47b8856b2d8a11d58b0e55d7ea0929e7e3f4dce1c211030d08ce939391eb0853c9415f2d1d994cab73d72e1cc4e8eb91256ab18d31ac40ef61671f8ad50d8f072ddcde6318c9a36e8d4ea505f15a78367bc90aa442933590fa5123f4e54bab9711d6f80289b2aab4de738e9f37cbe143eb2e5b3a5801ca5872ceefd9a59230a2dff90a8938b11779ea1cf2b5d47e205579db1ed74067a57168a5c9ccc6ceae74bbc3a3f04c53043f94c5c27649d67dcedfc", 0xd7}, {&(0x7f0000000580)="54fa4423d5eedbbef84f768f068318b6a210218b0a91be6fe3ded539d524c56484a458fe05e59ed6398cbd8313414c7628430fe519ebf2e8830a80de3d7077814f9c6ffb7477cc74cdf37aa851bf442ab6d9848c2c068d40040dac19305f4e1cc1574d09c0635b3108d02d06dc6b5ae9271a55beef8c31854aadc4051289fbb4e22609f0d3d78be79483ff60f5cf07e9257d3d6e378cf8f29b94eca6a5d2060fd3b2654b054604e7decfe6e16b4b9289cd9b50fa641384ad6f6f0b8b165284fbca044db27c87a145c3601518f4c1103337f95d3267605d5f17eea3f0", 0xdc}], 0x6, &(0x7f0000001800)=[@pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x2e}, r1}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @dontfrag={{0x14}}], 0x58}, 0x0) 14:49:46 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0x0, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:49:46 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:49:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:49:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:49:46 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 561.825317] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 561.840058] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 561.867280] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) [ 561.872678] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) [ 574.539087] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:50:06 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:50:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x9) unshare(0x60040000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x2) unshare(0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) vmsplice(r2, &(0x7f0000000500)=[{&(0x7f0000000140)="e8f2e176a2a4684b8c495ad3bd6947bf52dc69a4794c9d4ce24cf88464e2455a2f1b84aec1d000e30ffc0110cb5c90eb8bd685bd266e42e4f9ac5456114841ddce9057ce78b0eec8b9f617d647933729a1c1aece9a6abe361df1fcd86459361e8bdd43abace5c0dbf1dcb5539d4c76187661537c41b2b3824cb5a9dbd5c970f736d2e037db5247fc97786fe9da7c842c581b2eb37df11b2721b0640cfed6f345cc632cb6099c8eeced5d", 0xaa}, {&(0x7f0000000200)="258732fb1e9343d5e862ab9adb6825dc1684eaa6c4b6975a3252581006dc62805fb387c668883362c16f1c8aee4cad574a2683162ea2f423e7dcdb930e46eb006afb76a8b0538d6485a5209a8c4b3ae56e27b84943ea6e7b0bc14d10388533a842ae54161e83d8f824c89709731932a5b368da3550a35dc054b89c1798023880aa53fc818930cff2efc285fe3b57bba095fd4b55f79441b982e2a91b09daf9bbc3bc039981d4703fccaef5117d4a57da60339995f19cfd91aa737f728157459fbcfecaf648c0fc4c4c2813b9273c46ce3533267bc764444e", 0xd8}, {&(0x7f0000000400)="f0f0de58c2daeca84d81f64b56099b62e539ebfeb685a311c495beff0514efaed073ae0a7620da64fee403d3a39d59aab08bde50b21ec0fe63ff1c8a3e112c29ec3b4c3807fbfb4c8fd22087897e85e89bfc6309c366d02d0cdb6e82f5b7308d36c8febad306b0cf8847874f2e234755f50aa9d2c6ea8ee95d0ff70e413877c7a7fc6924e9ddb4ff420f142f1dabce3648357800ff9410171c256101700387dc0f5dc41ac0d6573e0351b089f5bd64373fbea8027f518115d433e883c40f6d9c2cdf876cd15126220556d95aad05b946e9248e0826546da4f57bf77715a7183a3f6b5008c0211f8576fe9616492ff655cb6b", 0xf2}], 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r3, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x80, {{0x2, 0x4e20, @multicast1}}}, 0x88) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @loopback}, {}, 0x2e4, 0x0, 0x0, 0x0, 0x10}) unshare(0x60900) 14:50:06 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0x0, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:50:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TIPC_NL_LINK_GET(r2, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x7ffffffc) 14:50:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:50:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2) [ 581.610162] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 581.615759] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 14:50:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:50:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:06 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x0, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 581.774662] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=33608 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 14:50:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3) [ 581.795812] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) [ 581.810430] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=50422 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 [ 581.831875] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=18432 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 [ 581.858392] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 581.870148] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 581.882739] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=89 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 [ 581.884582] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=143 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 [ 581.886337] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=179 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 [ 581.888140] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=224 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 [ 581.900500] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=84 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 [ 581.902358] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=109 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 [ 581.919018] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6444 comm=syz-executor.1 14:50:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:50:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)=""/141, 0x8d}, {&(0x7f0000000140)=""/161, 0xa1}, {&(0x7f0000000200)=""/109, 0x6d}, {&(0x7f0000000280)=""/154, 0x9a}], 0x4, &(0x7f0000000380)=""/249, 0xf9}, 0x40) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) clone3(&(0x7f0000002080)={0x128144000, 0x0, 0x0, 0x0, {}, &(0x7f0000000fc0)=""/36, 0x24, 0x0, &(0x7f0000002000)=[0x0], 0x1, {r1}}, 0x58) 14:50:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r2, 0x800, 0x0) sendfile(r2, r0, 0x0, 0x7ffffffc) accept4$unix(r0, &(0x7f0000000080), &(0x7f0000000140)=0x6e, 0x80000) openat(r2, &(0x7f0000000040)='./file1\x00', 0x12801, 0x0) 14:50:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x4) 14:50:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:17 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x0, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:50:17 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 592.743809] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 592.755287] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 592.786272] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 14:50:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x5) 14:50:17 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x0, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:50:17 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:50:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 592.880947] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 592.919388] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 593.003474] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 593.005436] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 593.011455] EXT4-fs (loop4): mount failed 14:50:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:31 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) stat(&(0x7f0000000040)='./file2\x00', &(0x7f0000000140)) linkat(r0, &(0x7f00000001c0)='./file1\x00', r0, &(0x7f0000000200)='./file0\x00', 0x1000) mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0xc000, 0x1) faccessat2(r0, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0) 14:50:31 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:50:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x8) 14:50:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)=""/141, 0x8d}, {&(0x7f0000000140)=""/161, 0xa1}, {&(0x7f0000000200)=""/109, 0x6d}, {&(0x7f0000000280)=""/154, 0x9a}], 0x4, &(0x7f0000000380)=""/249, 0xf9}, 0x40) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xfff, 0x0) clone3(&(0x7f0000002080)={0x128144000, 0x0, 0x0, 0x0, {}, &(0x7f0000000fc0)=""/36, 0x24, 0x0, &(0x7f0000002000)=[0x0], 0x1, {r1}}, 0x58) 14:50:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:50:31 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x0, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 606.990627] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 606.994328] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 607.006327] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 607.020575] tmpfs: Unknown parameter './file2' 14:50:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 607.034484] EXT4-fs (loop4): mount failed [ 607.048194] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:31 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:50:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe) 14:50:31 executing program 2: shmget$private(0x0, 0x1000, 0x2610d5e356cc5f6f, &(0x7f0000ff8000/0x1000)=nil) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x6000) shmctl$SHM_LOCK(r0, 0xb) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0xe000) shmat(r0, &(0x7f0000ff7000/0x4000)=nil, 0x1000) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff7000/0x3000)=nil) 14:50:31 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x0, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 607.178284] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 607.199391] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:31 executing program 1: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x0, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:50:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:31 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:50:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x34) 14:50:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe) [ 607.321859] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 607.332427] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 607.341874] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 14:50:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 607.353733] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 607.385062] EXT4-fs (loop4): mount failed [ 607.441335] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:50:43 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x0, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:50:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0xf0, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@dev={0xac, 0x14, 0x14, 0xa}}, @in=@private, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0xf0}}, 0x0) 14:50:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 14:50:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x1f4) 14:50:43 executing program 2: prctl$PR_SVE_GET_VL(0x33, 0x14b95) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0xbe9, 0x3c001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x12, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') preadv(r3, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, 0x0) close(r1) 14:50:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 618.707443] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 618.717520] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) syz_io_uring_complete(r1) r2 = socket$inet(0x2, 0x800, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) [ 618.748532] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.1'. 14:50:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x240) [ 618.803414] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 618.840629] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 618.852207] EXT4-fs (loop4): mount failed [ 618.873156] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:55 executing program 2: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x0, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:50:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x300) 14:50:55 executing program 1: mount(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000040)='efs\x00', 0x3009001, 0x0) rmdir(&(0x7f00000001c0)='./file0/file0\x00') 14:50:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:55 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 14:50:55 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x0, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:50:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 631.133900] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 631.157370] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 631.169178] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 631.172782] EXT4-fs (loop4): mount failed 14:50:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3e8) 14:50:55 executing program 1: ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = syz_io_uring_setup(0x2ed2, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x2981, 0xe228, 0x0, &(0x7f0000000000)={[0x2]}, 0x8) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat2(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)={0x2002, 0x8}, 0x18) io_uring_setup(0x7f5a, &(0x7f0000000400)={0x0, 0x4eda, 0x10, 0x1, 0x63, 0x0, r3}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) fcntl$getflags(r5, 0x1) io_uring_register$IORING_REGISTER_PROBE(r4, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e4f0cb25e3263ddb5d6f114134f1f9b7bbe44451d3f75b7deb919606f5c7f60f10640c6de6eee"], 0x7) pwrite64(r2, &(0x7f0000000300)="af", 0xfffffeb2, 0x0) io_uring_enter(0xffffffffffffffff, 0x66a9, 0xec68, 0x2, &(0x7f00000002c0)={[0x1]}, 0x8) dup(r0) unlink(&(0x7f0000000100)='./file0\x00') fallocate(r1, 0x8, 0x0, 0x8000) syz_io_uring_setup(0x6a83, &(0x7f00000001c0)={0x0, 0xab0e, 0x20, 0x1, 0x3c7}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 14:50:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 631.257436] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:55 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 14:50:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 631.285622] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:55 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x0, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:50:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {0x0, 0x0, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:50:55 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYRES16, @ANYRES32], 0xfdef) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000140)={0x2, {0x2, 0x0, 0x0, 0x4}}) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0xf2c, 0xf2d1, 0x9, 0x3ff, 0x3}}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 631.334946] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:50:56 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:50:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:50:56 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x0, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:50:56 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x500) 14:50:56 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:50:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 631.503828] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 631.519291] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 631.522679] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 631.538240] EXT4-fs (loop4): mount failed 14:51:07 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) name_to_handle_at(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000140)=@FILEID_INO32_GEN={0x8, 0x1, {0x1b, 0x3}}, &(0x7f0000000200), 0x400) mknodat$loop(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) faccessat2(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x2080) name_to_handle_at(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="14e19b02a4fd410500553f78735160000082faa22f5c9258ba29a28c942068dc171627a4e08198286bbf13e6337d7da49f2edd57a03dfbdfce897cea5918bbcf1de0d00b46daa62782903e72a9b631ef2b5629cd2b95ef5195fa23e8e9c7b35e97e0af5d4cfffdae2d3c2554c657d4532c5618acf252faba39b07a51f86abf6028a2dd3f26dd00"], &(0x7f00000001c0), 0x0) 14:51:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:51:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe00) 14:51:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800), 0x0, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:51:07 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:51:07 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 642.662572] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 642.672798] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:51:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:07 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, 0x5ade, 0x0) fcntl$getflags(r0, 0x40a) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r1, 0x0, 0x0) lseek(r1, 0x80000000000000, 0x2) 14:51:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x597dd34155ec35de) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e24, @empty}}, 0x0, 0x0, 0x1c, 0x0, "a0d5b6ca70aa65231b275927e8f6501a724a4ddc9a765245a7a8a80a6c902a69d906c5a1200d6a7615033184e3fd9b8237e165c8c442d0b76d3517662c8f77c926be0c31b9facb62f1c0090353761801"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) socketpair(0x28, 0x80000, 0x85e, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e23, 0xffffffff, @remote, 0x2}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000002780)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="09bf144bf8eb114da367517b54f6cfb19916d7b317824a54d18cad499d03ee21a6ca635ee58114f4e9fab2a6d2ba65e5c518801a7631013a86c3319997a5f432f26977b9763c6da796c1810051b16bb60a58fdceb4619ea90d17036116bc31b5bba127c5243d229ba92be5143872eaeb19607f3e30da3d2f1142e2c107fbb53bd66f448f47bf5ecd6587cef5954dc9f72934e7134a31fcbd1e6f2dcc32dc64d27e0f049383626f338a3a5c5b9c6b194619b433ed4a48900716bb1e0862ff343bc0f29509f6d211733495e08e0a2fa6bf1c1579ee8c5e3627d7a44d3f0b49c6b05fdf45b23c", 0xe5}, {&(0x7f0000001700)="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", 0xa73}], 0x2}}], 0x1, 0x0) [ 642.720296] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 642.720311] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 642.720444] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 14:51:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 642.736846] EXT4-fs (loop4): mount failed [ 642.746188] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:51:07 executing program 0 (fault-call:5 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 642.802239] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 642.804811] FAULT_INJECTION: forcing a failure. [ 642.804811] name failslab, interval 1, probability 0, space 0, times 0 14:51:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2000) [ 642.806086] CPU: 0 PID: 6722 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 642.806889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 642.808190] Call Trace: [ 642.808502] dump_stack+0x107/0x163 [ 642.808925] should_fail.cold+0x5/0xa [ 642.809363] ? __alloc_skb+0x6d/0x620 [ 642.809801] should_failslab+0x5/0x10 [ 642.810233] kmem_cache_alloc_node+0x55/0x370 [ 642.810731] ? do_raw_spin_lock+0x121/0x260 [ 642.811211] __alloc_skb+0x6d/0x620 [ 642.811602] tcp_send_fin+0x1be/0xbb0 [ 642.812031] tcp_close+0xb34/0x1200 [ 642.812426] inet_release+0xe9/0x1f0 [ 642.812834] inet6_release+0x4c/0x70 [ 642.813246] __sock_release+0xd2/0x290 [ 642.813676] sock_close+0x18/0x20 [ 642.814045] __fput+0x285/0x980 [ 642.814408] ? __sock_release+0x290/0x290 [ 642.814881] task_work_run+0xe2/0x1a0 [ 642.815311] exit_to_user_mode_prepare+0x155/0x160 [ 642.815855] syscall_exit_to_user_mode+0x38/0x230 [ 642.816475] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 642.817055] RIP: 0033:0x466609 [ 642.817400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 642.819432] RSP: 002b:00007f89777a4188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 642.820278] RAX: 0000000000000000 RBX: 000000000056bf80 RCX: 0000000000466609 [ 642.821082] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000003 [ 642.821872] RBP: 00007f89777a41d0 R08: 0000000000000000 R09: 0000000000000000 [ 642.822654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 642.823438] R13: 00007ffe2fe51d5f R14: 00007f89777a4300 R15: 0000000000022000 14:51:07 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:07 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800), 0x0, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 642.892962] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 642.905237] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:51:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2) [ 642.923542] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 642.947313] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 642.952795] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 642.954884] sr 1:0:0:0: [sr0] tag#0 CDB: Start/Stop Unit [ 642.956116] sr 1:0:0:0: [sr0] tag#0 CDB[00]: 1b 2f 3d 89 c7 47 a6 3f 70 c6 44 fb 79 2e 3b 2b [ 642.957991] sr 1:0:0:0: [sr0] tag#0 CDB[10]: 63 [ 642.992617] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 642.998888] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 643.002892] EXT4-fs (loop4): mount failed 14:51:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800), 0x0, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:51:19 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:51:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3400) 14:51:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3) 14:51:19 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 655.031351] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 655.037532] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 655.047868] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 655.049709] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 655.053792] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 655.056623] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 14:51:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 655.063569] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 655.065051] sr 1:0:0:0: [sr0] tag#0 CDB: Start/Stop Unit [ 655.065831] EXT4-fs (loop4): mount failed [ 655.066445] sr 1:0:0:0: [sr0] tag#0 CDB[00]: 1b 2f 3d 89 c7 47 a6 3f 70 c6 44 fb 79 2e 3b 2b [ 655.067631] sr 1:0:0:0: [sr0] tag#0 CDB[10]: 63 14:51:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 655.107591] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 655.109132] sr 1:0:0:0: [sr0] tag#0 CDB: Start/Stop Unit [ 655.109977] sr 1:0:0:0: [sr0] tag#0 CDB[00]: 1b 2f 3d 89 c7 47 a6 3f 70 c6 44 fb 79 2e 3b 2b [ 655.111311] sr 1:0:0:0: [sr0] tag#0 CDB[10]: 63 14:51:19 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:51:19 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 655.231235] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 655.232345] sr 1:0:0:0: [sr0] tag#0 CDB: Start/Stop Unit [ 655.233115] sr 1:0:0:0: [sr0] tag#0 CDB[00]: 1b 2f 3d 89 c7 47 a6 3f 70 c6 44 fb 79 2e 3b 2b [ 655.234027] sr 1:0:0:0: [sr0] tag#0 CDB[10]: 63 14:51:30 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:30 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x0, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:51:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f0000000000000100400000", 0x1f, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:51:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x4002) 14:51:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x4) 14:51:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0x0, 0x11, 0x1, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 666.077880] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 666.081253] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 666.091267] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 666.094385] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 666.110728] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 666.112146] sr 1:0:0:0: [sr0] tag#0 CDB: Start/Stop Unit [ 666.112744] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 666.112950] sr 1:0:0:0: [sr0] tag#0 CDB[00]: 1b 2f 3d 89 c7 47 a6 3f 70 c6 44 fb 79 2e 3b 2b [ 666.115818] sr 1:0:0:0: [sr0] tag#0 CDB[10]: 63 [ 666.128186] EXT4-fs (loop4): mount failed 14:51:30 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x0, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:51:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x7fe5) [ 666.263554] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:51:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe57f) 14:51:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x5) 14:51:42 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:42 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x0, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:51:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f0000000000000100400000", 0x1f, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:51:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 677.640839] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 677.654566] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 677.671443] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 677.675741] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 677.677265] sr 1:0:0:0: [sr0] tag#0 CDB: Start/Stop Unit [ 677.678134] sr 1:0:0:0: [sr0] tag#0 CDB[00]: 1b 2f 3d 89 c7 47 a6 3f 70 c6 44 fb 79 2e 3b 2b [ 677.679425] sr 1:0:0:0: [sr0] tag#0 CDB[10]: 63 [ 677.696957] EXT4-fs (loop4): mount failed 14:51:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:51:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:51:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:42 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x0, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:51:42 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) 14:51:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe803) 14:51:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x8) 14:51:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 677.839591] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 677.850756] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 677.864123] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:51:42 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 677.877818] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:51:42 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xf401) 14:51:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:51:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f0000000000000100400000", 0x1f, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 677.932312] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:51:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe) [ 677.986174] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:51:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 678.016084] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 678.029523] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 678.081499] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 678.089312] EXT4-fs (loop4): mount failed 14:51:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400", 0x2e, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:51:54 executing program 2 (fault-call:3 fault-nth:0): openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:51:54 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x0, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:51:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x34) 14:51:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:51:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:51:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:51:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xff0f) [ 689.433462] net_ratelimit: 2 callbacks suppressed [ 689.433473] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 689.435693] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 689.444275] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 689.448832] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 689.463332] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 689.483397] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 689.486637] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 689.486781] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:51:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 689.514347] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 689.541107] EXT4-fs (loop4): mount failed 14:52:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x1f4) 14:52:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400", 0x2e, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:52:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x50000) 14:52:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:52:09 executing program 7: syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x60040000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x2) unshare(0x0) socket$inet(0x2, 0x1, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@x25={0x9, @remote}, &(0x7f0000000080)=0x80) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/keys\x00', 0x0, 0x0) r2 = openat$cgroup_type(r1, &(0x7f00000001c0), 0x2, 0x0) ftruncate(0xffffffffffffffff, 0xffffffff) fallocate(r2, 0x14, 0x4, 0x4) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}, {0x2, 0x0, @remote}, 0x2e4, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x6}) 14:52:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:52:09 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x0, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:52:09 executing program 3 (fault-call:5 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 704.972686] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 704.978812] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 705.001652] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 705.026730] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 705.035638] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 705.040731] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 705.069525] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 705.094301] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 705.108093] FAULT_INJECTION: forcing a failure. [ 705.108093] name failslab, interval 1, probability 0, space 0, times 0 [ 705.110554] CPU: 1 PID: 6934 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 705.111997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 705.114384] Call Trace: [ 705.114954] dump_stack+0x107/0x163 [ 705.115731] should_fail.cold+0x5/0xa [ 705.116540] ? __alloc_skb+0x6d/0x620 [ 705.117349] should_failslab+0x5/0x10 [ 705.118185] kmem_cache_alloc_node+0x55/0x370 [ 705.119136] ? do_raw_spin_lock+0x121/0x260 [ 705.120053] __alloc_skb+0x6d/0x620 [ 705.120832] tcp_send_fin+0x1be/0xbb0 [ 705.121669] tcp_close+0xb34/0x1200 [ 705.122455] inet_release+0xe9/0x1f0 [ 705.123247] inet6_release+0x4c/0x70 [ 705.124035] __sock_release+0xd2/0x290 [ 705.124860] sock_close+0x18/0x20 [ 705.125612] __fput+0x285/0x980 [ 705.126314] ? __sock_release+0x290/0x290 [ 705.127204] task_work_run+0xe2/0x1a0 [ 705.128021] exit_to_user_mode_prepare+0x155/0x160 [ 705.129062] syscall_exit_to_user_mode+0x38/0x230 [ 705.130110] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 705.131196] RIP: 0033:0x466609 [ 705.131878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.135787] RSP: 002b:00007f89dbfdd188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 705.137396] RAX: 0000000000000000 RBX: 000000000056c038 RCX: 0000000000466609 [ 705.138912] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000003 [ 705.140418] RBP: 00007f89dbfdd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.141942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 705.143448] R13: 00007fff9e33105f R14: 00007f89dbfdd300 R15: 0000000000022000 14:52:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x240) [ 705.157613] EXT4-fs (loop4): mount failed 14:52:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x200000) [ 705.233041] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:09 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x0, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 705.292165] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:09 executing program 1: mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 705.331963] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x4b47, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:52:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400", 0x2e, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 705.375677] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x300) [ 705.503771] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 705.510340] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 705.528168] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 705.536695] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 705.555433] EXT4-fs (loop4): mount failed 14:52:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x1000000) 14:52:22 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x4b47, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:52:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3e8) 14:52:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 14:52:22 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x0, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:52:22 executing program 1: mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:52:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x4b49, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:52:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af3010004000000000000000000", 0x36, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 717.468964] net_ratelimit: 1 callbacks suppressed [ 717.468976] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 717.474308] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 717.490375] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:22 executing program 1: mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 717.524420] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2) 14:52:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2000000) [ 717.557426] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 717.562345] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 717.568465] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 14:52:22 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x0, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:52:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x1000000) [ 717.600011] EXT4-fs (loop4): mount failed 14:52:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x541b, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 717.640105] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x500) 14:52:22 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x404542, 0x110) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x200000, 0x9) getdents64(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r1, 0x0, 0x0) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(r2, &(0x7f0000000080)='./file1\x00', 0x0, 0xd) io_setup(0x3f000000, &(0x7f0000000040)=0x0) io_submit(r3, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, r2, &(0x7f0000000140)="ee", 0x1, 0x800000}]) [ 717.689369] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:22 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 717.699592] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af3010004000000000000000000", 0x36, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 717.725688] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 717.734659] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3) 14:52:22 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x0, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:52:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe00) [ 717.805740] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 717.814383] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 717.818769] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 717.821283] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 717.834799] EXT4-fs (loop4): mount failed [ 717.860212] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 14:52:34 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='projid_map\x00') pread64(r0, &(0x7f0000000000)=""/33, 0x21, 0x8) fallocate(0xffffffffffffffff, 0x4a, 0xff, 0x100) 14:52:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af3010004000000000000000000", 0x36, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:52:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3000000) 14:52:34 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x0, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:52:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x5421, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:52:34 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:52:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2000) 14:52:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x4) [ 730.333351] net_ratelimit: 1 callbacks suppressed [ 730.333368] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 730.354705] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 730.365760] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 730.392602] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 730.394855] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 730.399155] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 730.414794] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 730.430135] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 14:52:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x5) [ 730.454652] EXT4-fs (loop4): mount failed [ 730.494360] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 730.509670] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x8) 14:52:45 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:52:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300", 0x3a, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:52:45 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x4000000) 14:52:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3400) 14:52:45 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0, 0xffffffff8100000f}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x9) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x420401, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 14:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x5450, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:52:45 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x0, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:52:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 740.627172] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 740.640581] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 740.648400] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 740.651202] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 740.661766] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 740.675905] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 740.681153] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:52:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe) 14:52:45 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x0, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 740.723274] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 14:52:45 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x8000000) 14:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x5451, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 740.736874] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 740.760302] EXT4-fs (loop4): mount failed [ 740.781693] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x4002) 14:52:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300", 0x3a, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 740.809198] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 740.830549] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 740.835830] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:52:45 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe000000) 14:52:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 740.918851] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 740.929126] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 740.943526] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 740.947556] EXT4-fs (loop4): mount failed 14:52:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300", 0x3a, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:52:56 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x20000000) 14:52:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:52:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x7fe5) 14:52:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x34) 14:52:56 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x0, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:52:56 executing program 7: unshare(0x60040000) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000140)=@isofs_parent={0x14}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8923, &(0x7f0000000140)={'lo\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') recvfrom$inet6(r0, &(0x7f0000000040)=""/177, 0xb1, 0x2020, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x40}, 0x1c) preadv(0xffffffffffffffff, &(0x7f00000001c0), 0x4, 0x20000fff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'tunl0\x00'}) 14:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x5460, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 751.655830] net_ratelimit: 4 callbacks suppressed [ 751.655841] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 751.661847] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 751.670261] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 751.672663] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 751.680662] : renamed from lo 14:52:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, 0x0, 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:52:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe57f) [ 751.719306] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 751.721614] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 751.723984] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 751.725819] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 751.727387] EXT4-fs (loop4): mount failed [ 751.788179] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 751.801615] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe803) 14:53:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x1f4) 14:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x6609, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:53:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, 0x0, 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:09 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x0, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x34000000) 14:53:09 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}, @nested={0x8, 0x19, 0x0, 0x1, [@generic="cda96844"]}]}, 0x24}}, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r4, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)={0x1c, 0x0, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c880}, 0x4044880) sendmsg$NL80211_CMD_SET_PMK(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b4000000", @ANYRES16=0x0, @ANYBLOB="00012cebb99387091d4dda9dcabd0500fbdbdf257b00000008000300", @ANYRES32=r5, @ANYBLOB="0c00990004000000000000000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100001400fe008116318664cdae6aec6b71baba6f6dfb1400020179671d343424bf4d15a10d504ec5aa880a00060008021100000100000a00060008021100000100001400fe00750000000015000000000000000000001400fe00cf0600000000000000f05fd28e7ce85e"], 0xb4}}, 0x8000) sendmsg$NL80211_CMD_GET_WOWLAN(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x20, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0x8, 0x3, r5}, @void}}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x4000800) 14:53:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af3010004000000000000000000000003000000", 0x3c, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 764.911226] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 764.915118] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 764.929657] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 764.934509] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 764.939157] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 764.968936] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 14:53:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xf401) [ 764.974625] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 14:53:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x40020000) [ 764.984550] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 764.988149] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 765.000067] EXT4-fs (loop4): mount failed 14:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x660c, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 765.032229] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, 0x0, 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af3010004000000000000000000000003000000", 0x3c, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:53:09 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x0, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:09 executing program 7: r0 = fork() fork() tkill(r0, 0x4) socket$inet6_icmp(0xa, 0x2, 0x3a) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(r0, 0x3, 0x0, &(0x7f0000000000)=0x5) [ 765.087166] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x240) [ 765.141042] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe57f0000) [ 765.205125] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe8030000) 14:53:21 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x0, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x300) 14:53:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x6611, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:53:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xff0f) 14:53:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af3010004000000000000000000000003000000", 0x3c, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:53:21 executing program 7: unshare(0x84030c00) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe66) [ 776.992989] net_ratelimit: 1 callbacks suppressed [ 776.993001] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 776.997685] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 777.031150] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 777.036322] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x50000) [ 777.065061] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 777.072724] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 777.076135] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 777.077954] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 777.078008] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 777.081265] EXT4-fs (loop4): mount failed [ 777.086107] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 777.092169] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24000000110001010000000000000000000000000800000000000000040000000400358019f74649edfcdf656c657e1c50bc6a73e852f1282d1671b4003f76335a439dee558d5802206ef24f0dd89ee4a7a965da3e92f56fc1ab466d2386da64f82f254ecb7f2053bd5c63e7ec59cd409dcc568fcb1a9a5949965eaea6f4f50d51c49451f5a983d05f3ceeb6aaa6c99bc2a7a92215b826a776f7025f2c046533de93a2b1464ab2d71697f052d44be81dcfddc930d3a678714fda1007f3d5436567178efb086976c6"], 0x24}}, 0x0) 14:53:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:53:21 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x0, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3e8) 14:53:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xf4010000) 14:53:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x6612, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:53:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x6628, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:53:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x200000) 14:53:21 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 777.288955] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 777.297332] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 777.306008] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 777.311547] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:21 executing program 7: ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) r0 = syz_io_uring_setup(0x2ed2, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x2]}, 0x8) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x4) fallocate(r3, 0x0, 0x0, 0x8800000) io_uring_register$IORING_REGISTER_PROBE(r3, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x9) pwrite64(r2, &(0x7f0000000300)="af", 0xfffffeb2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x8, 0x0) fallocate(r0, 0x41, 0x8, 0x66) fallocate(r1, 0x8, 0x0, 0x8000) [ 777.319112] EXT4-fs (loop4): mount failed 14:53:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40046629, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:53:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xff0f0000) 14:53:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:53:22 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 777.457693] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 777.478237] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 777.501770] EXT4-fs (loop4): mount failed 14:53:34 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={'\x00', 0x0, 0x401, 0x8}) signalfd(r0, &(0x7f0000000000)={[0x79b]}, 0x8) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x81, 0x7fff}) 14:53:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x500) 14:53:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x5000000000000) 14:53:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f000000000000040040", 0x1d, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:53:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x1000000) 14:53:34 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40049409, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 789.911123] net_ratelimit: 6 callbacks suppressed [ 789.911131] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 789.922559] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 789.929812] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 789.934891] EXT4-fs error (device loop4): ext4_quota_enable:6380: comm syz-executor.4: Bad quota inode # 3 [ 789.936602] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 789.938258] EXT4-fs warning (device loop4): ext4_enable_quotas:6417: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 789.954488] EXT4-fs (loop7): Unrecognized mount option "./file0" or missing value [ 789.962496] EXT4-fs (loop4): mount failed [ 789.966525] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:34 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x0, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40086602, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 790.014782] EXT4-fs (loop7): Unrecognized mount option "./file0" or missing value 14:53:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x20000000000000) 14:53:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2000000) 14:53:34 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={'\x00', 0x0, 0x401, 0x8}) signalfd(r0, &(0x7f0000000000)={[0x79b]}, 0x8) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x81, 0x7fff}) 14:53:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe00) [ 790.065261] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 790.070817] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 790.080755] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 790.082795] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 790.105140] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 790.108971] EXT4-fs (loop7): Unrecognized mount option "./file0" or missing value 14:53:45 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x100000000000000) 14:53:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2000) 14:53:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:53:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40086604, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 801.296776] EXT4-fs warning (device sda): __ext4_ioctl:884: Setting inode version is not supported with metadata_csum enabled. 14:53:45 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x0, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:45 executing program 7: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3000000) 14:53:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 801.350517] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 801.371688] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 801.378147] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 801.380821] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 801.386650] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 801.391469] EXT4-fs (loop4): get root inode failed [ 801.392685] EXT4-fs (loop4): mount failed [ 801.408576] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:53:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40086607, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:53:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3400) 14:53:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x4000000) 14:53:58 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x0, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x8}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r2, 0x4b4d, &(0x7f00000002c0)={0x2, {0x2, 0x2, 0x9}}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000180)={"6452c22d5382a3d2df53c8b9c720e9af", 0x0, 0x0, {0x1, 0x7}, {0xb5, 0xa29}, 0x0, [0xeca, 0x8, 0x1ff, 0x0, 0x2400000000, 0x3, 0x8, 0x8, 0x6, 0x9, 0x80000001, 0x2, 0x4, 0x101, 0x4]}) ioctl$TIOCL_SETSEL(r4, 0x4b4d, &(0x7f00000002c0)) fcntl$getflags(r4, 0xb) ioctl$TIOCL_SETSEL(r3, 0x4b4d, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x41, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r5, &(0x7f0000000140)="dd", 0x1, 0x0) fallocate(r1, 0x3, 0x0, 0x8000) 14:53:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x200000000000000) [ 813.775174] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 813.780602] EXT4-fs warning (device sda): ext4_group_extend:1784: can't shrink FS - resize aborted 14:53:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x300000000000000) [ 813.814642] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 813.818672] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 813.828435] EXT4-fs warning (device sda): ext4_group_extend:1784: can't shrink FS - resize aborted [ 813.848098] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 813.855134] EXT4-fs (loop4): get root inode failed [ 813.855859] EXT4-fs (loop4): mount failed [ 813.861040] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 813.882525] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x6609, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:53:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:53:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x4002) 14:53:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x8000000) 14:53:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x400000000000000) 14:53:58 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x0, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:53:58 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 814.015151] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {0x0, 0x0, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 814.021730] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:58 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x0, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 814.040206] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40087602, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 814.057213] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:53:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 814.153079] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 814.158346] EXT4-fs warning (device sda): __ext4_ioctl:884: Setting inode version is not supported with metadata_csum enabled. [ 814.166022] EXT4-fs (loop4): get root inode failed [ 814.167228] EXT4-fs (loop4): mount failed [ 814.178354] EXT4-fs warning (device sda): __ext4_ioctl:884: Setting inode version is not supported with metadata_csum enabled. 14:54:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {0x0, 0x0, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:54:11 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x0, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:54:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x7fe5) 14:54:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x800000000000000) 14:54:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x100000000000000) 14:54:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe000000) 14:54:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:54:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x400c6615, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 826.467790] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40106614, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 826.476566] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 826.484272] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 826.485329] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 826.495657] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 826.513646] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 826.515205] EXT4-fs (loop4): get root inode failed [ 826.515819] EXT4-fs (loop4): mount failed [ 826.528137] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe57f) 14:54:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x401c5820, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:54:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:54:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x20000000) 14:54:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x400000000000000) 14:54:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe00000000000000) 14:54:22 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x0, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:54:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {0x0, 0x0, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 837.755998] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 837.779161] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 837.784299] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 837.784548] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 837.814327] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 837.817451] EXT4-fs (loop4): get root inode failed [ 837.818605] EXT4-fs (loop4): mount failed [ 837.827468] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2000000000000000) 14:54:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe00000000000000) 14:54:22 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x0, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) [ 837.903111] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:22 executing program 7: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x0, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:54:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:54:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 14:54:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x34000000) [ 837.980842] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe803) 14:54:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x4020940d, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:54:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x3400000000000000) [ 838.100597] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:22 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x0, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:54:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40286608, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 838.120674] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 838.127580] EXT4-fs (loop4): get root inode failed [ 838.128533] EXT4-fs (loop4): mount failed [ 838.139346] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 838.139571] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 838.175196] EXT4-fs warning (device sda): verify_group_input:131: Cannot add at group 83 (only 16 groups) 14:54:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 14:54:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40305828, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:54:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x4002000000000000) 14:54:35 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:54:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:54:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x40020000) 14:54:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xf401) 14:54:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2000000000000000) [ 850.778359] net_ratelimit: 2 callbacks suppressed [ 850.778373] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 850.802800] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 850.812225] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 850.813147] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:35 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000100)={0xd1c, 0x0, 0x4, 0x9, 0x0, "a609bb1379070000000000000000e8ff00"}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000000)={0x80, 0x8d, 0x5}) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000080)={0x6, 0x81}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000000c0)) [ 850.885747] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 850.893070] EXT4-fs (loop4): get root inode failed [ 850.894265] EXT4-fs (loop4): mount failed [ 850.900836] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40305829, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:54:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe57f000000000000) [ 851.025115] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:49 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe803000000000000) 14:54:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe57f0000) 14:54:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x4030582a, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:54:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600), 0x0, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:54:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xff0f) 14:54:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 14:54:49 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:54:49 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x0, @empty}}) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f0000000200)={0x0, 0x77f4d314}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000000)="8434d077035bff75ca21e34b5873eeb99911c759675ac5ea04e4559789a37471fc13e22266685db06b8a", 0x2a}, {&(0x7f0000000100)="656a9baed90e5f59918f8790d44277726bcc3ffcf08d55ce05fc75213ad0561df94efe2faa2be7c3ed17a9c6917467ea1a91352e91053a22ed9aef42b640c2dc4eafeed5583f", 0x46}], 0x2) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e23, @private=0xa010101}, {0x2, 0x4e23, @empty}, 0x301, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)='nr0\x00', 0x1f, 0x800, 0x2}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69040, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff7ffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x2, 0xff, 0x0, 0x0, 0x8, 0x80448, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9847, 0x2, @perf_config_ext={0x4, 0x8}, 0x20, 0x3, 0x2, 0x6, 0x1f, 0xa5, 0x1, 0x0, 0x87, 0x0, 0x800}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, r2, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000300)={0x1000, 0x9, 0x1f, "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"}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5451, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001340), 0x81, 0x0) [ 864.428826] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 864.434593] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 864.441084] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 864.471748] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated 14:54:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 864.485564] EXT4-fs (loop4): get root inode failed [ 864.486797] EXT4-fs (loop4): mount failed [ 864.497350] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:49 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xf401000000000000) 14:54:49 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe803000000000000) 14:54:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x4030582b, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:54:49 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:54:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x50000) 14:54:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe8030000) 14:54:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f465", 0xf, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "f0862b54417b86e8db67160e4e715684b5a6b42198900b973a5a7319267c82b86ed346e73fd2ab4091f81ed06a40afb9d4e600109674ae6608c2e8a90589596c260c392c2177f08765990898a2cf5abd243b867ed2f5a74cf00f8281f5b913411c64e045161d9929cd04eab54ffe39bac46ceeb80607e9467d2d48236717afb72f947d5d7695d628a6c2666ecc0a9e3359d81e9b63273f8c836e4bec3d34295bf8efce1dc8bebbf6b08f56318e0a2f513f67a0991b769891279d35e802bb740ec6d00702c454f67b633ec34336ecc256f7a3af98e3d1aa6803c4724824ecb27b50425af1ef17e6e380db736661be85c991d944af008650fc7da286e9195b80"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 864.646987] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 864.683058] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 864.689957] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 864.696233] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 864.747645] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:54:49 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xe803000000000000) 14:54:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x200000) [ 864.807597] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 864.813508] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 864.817153] EXT4-fs (loop4): get root inode failed [ 864.818426] EXT4-fs (loop4): mount failed 14:54:49 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xff0f000000000000) 14:54:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000003c0)="1b2f3d89c747a63f70c644fb792e3b2b63", 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) 14:54:49 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x0, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:54:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40305839, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:54:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f465", 0xf, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 865.016677] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 865.019813] EXT4-fs (loop4): get root inode failed [ 865.021035] EXT4-fs (loop4): mount failed 14:55:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f465", 0xf, 0x2400}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040", 0x3d, 0x2800}, {0x0, 0x0, 0x80002880}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x20000}], 0x0, &(0x7f00000003c0)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0x114, 0x0, 0x1, "e77d17adbf0b6d7d76023c874d2291d8", "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"}, 0x114, 0x1) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 14:55:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xf4010000) 14:55:01 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xffffffff00000000) 14:55:01 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x0, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:55:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x1000000) 14:55:01 executing program 7: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000002c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xb1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000180)) 14:55:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x40806685, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x88, &(0x7f0000000240)=""/136}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:55:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x3, 0x10000, 0xffffffffffffffff, 0x0}) [ 877.323117] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI [ 877.324326] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 877.325234] CPU: 0 PID: 7673 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 877.326016] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 877.328326] RIP: 0010:scsi_queue_rq+0x1eb1/0x2a70 [ 877.328858] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 46 0b 00 00 48 8b 8b 40 02 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 ca 48 c1 ea 03 <0f> b6 04 02 48 89 ca 83 e2 07 38 d0 7f 08 84 c0 0f 85 48 0b 00 00 [ 877.330830] RSP: 0018:ffff888023ac73c0 EFLAGS: 00010256 [ 877.331397] RAX: dffffc0000000000 RBX: ffff88800ed72340 RCX: 0000000000000000 [ 877.332161] RDX: 0000000000000000 RSI: ffffffff829518be RDI: 0000000000000003 [ 877.332918] RBP: 0000000000000000 R08: 0000000000000001 R09: ffff88800ed72588 [ 877.333679] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800ed72580 [ 877.334433] R13: ffff88800f1a6000 R14: 0000000000000000 R15: ffff88800c274000 [ 877.335195] FS: 00007f8bf3677700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 877.336062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 877.336690] CR2: 0000001b2d123000 CR3: 0000000018a64000 CR4: 0000000000350ef0 [ 877.337441] Call Trace: [ 877.337726] blk_mq_dispatch_rq_list+0x36d/0x1bb0 [ 877.338241] ? scsi_mq_get_budget+0x1/0x280 [ 877.338705] ? __blk_mq_sched_dispatch_requests+0x236/0x490 [ 877.339332] ? blk_mq_dequeue_from_ctx+0x7f0/0x7f0 [ 877.339874] ? do_raw_spin_lock+0x121/0x260 [ 877.340347] ? rwlock_bug.part.0+0x90/0x90 [ 877.340839] ? hctx_lock+0x7f/0x1d0 [ 877.341248] __blk_mq_sched_dispatch_requests+0x263/0x490 [ 877.341849] ? blk_mq_sched_mark_restart_hctx+0x80/0x80 [ 877.342438] blk_mq_sched_dispatch_requests+0xfb/0x180 [ 877.343014] __blk_mq_run_hw_queue+0x12c/0x290 [ 877.343510] ? blk_mq_start_request+0x480/0x480 [ 877.344028] __blk_mq_delay_run_hw_queue+0x4f1/0x550 [ 877.344593] blk_mq_run_hw_queue+0x16c/0x2f0 [ 877.345072] ? blk_mq_delay_run_hw_queues+0x1a0/0x1a0 [ 877.345640] ? do_raw_spin_unlock+0x4f/0x210 [ 877.346124] ? _raw_spin_unlock+0x1a/0x30 [ 877.346573] blk_mq_sched_insert_request+0x380/0x440 [ 877.347125] ? __blk_mq_sched_bio_merge+0x3c0/0x3c0 [ 877.347663] ? blk_execute_rq_nowait+0x130/0x130 [ 877.348184] ? blk_account_io_start+0x11b/0x170 [ 877.348712] ? __raw_spin_lock_init+0x34/0x100 [ 877.349219] blk_execute_rq+0xd4/0x1b0 [ 877.349651] ? blk_end_sync_rq+0x50/0x50 [ 877.350099] ? capable+0xd8/0x100 [ 877.350476] sg_io+0x60d/0xf70 [ 877.350839] ? blk_verify_command+0x150/0x150 [ 877.351321] ? mark_lock+0xf5/0x2df0 [ 877.351727] ? get_order+0x20/0x20 [ 877.352111] ? lock_chain_count+0x20/0x20 [ 877.352574] ? __lock_acquire+0x1666/0x5b20 [ 877.353039] scsi_cmd_ioctl+0x522/0x590 [ 877.353463] ? sg_scsi_ioctl+0x7b0/0x7b0 [ 877.353910] ? __lock_acquire+0x1666/0x5b20 [ 877.354380] scsi_cmd_blk_ioctl+0xe1/0x130 [ 877.354839] ? mark_lock+0xf5/0x2df0 [ 877.355254] cdrom_ioctl+0xc4/0x2bb0 [ 877.355661] ? mmc_ioctl_cdrom_read_audio+0xc60/0xc60 [ 877.356222] ? __lockdep_reset_lock+0x180/0x180 [ 877.356752] ? find_held_lock+0x2c/0x110 [ 877.357199] ? __pm_runtime_resume+0xc5/0x180 [ 877.357684] ? mark_held_locks+0x9e/0xe0 [ 877.358127] ? blkdev_common_ioctl+0xfb/0x1870 [ 877.358621] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 877.359192] ? _raw_spin_unlock_irqrestore+0x34/0x40 [ 877.359746] ? trace_hardirqs_on+0x5b/0x180 [ 877.360215] ? __pm_runtime_resume+0xc5/0x180 [ 877.360717] sr_block_ioctl+0x141/0x1a0 [ 877.361149] ? sr_block_compat_ioctl+0x1b0/0x1b0 [ 877.361663] blkdev_ioctl+0x28d/0x700 [ 877.362079] ? blkdev_common_ioctl+0x1870/0x1870 [ 877.362596] ? __fget_files+0x251/0x410 [ 877.363048] block_ioctl+0xf9/0x140 [ 877.363451] ? blkdev_read_iter+0x1c0/0x1c0 [ 877.363932] __x64_sys_ioctl+0x196/0x210 [ 877.364382] do_syscall_64+0x33/0x40 [ 877.364805] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 877.365362] RIP: 0033:0x466609 [ 877.365705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 877.367724] RSP: 002b:00007f8bf3677188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 877.368568] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 877.369344] RDX: 0000000020000540 RSI: 0000000000002285 RDI: 0000000000000004 [ 877.370124] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 877.370907] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 877.371675] R13: 00007ffffb9c35cf R14: 00007f8bf3677300 R15: 0000000000022000 [ 877.372472] Modules linked in: [ 877.372969] ---[ end trace cdc87e9d11ede8aa ]--- [ 877.373513] RIP: 0010:scsi_queue_rq+0x1eb1/0x2a70 [ 877.374098] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 46 0b 00 00 48 8b 8b 40 02 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 ca 48 c1 ea 03 <0f> b6 04 02 48 89 ca 83 e2 07 38 d0 7f 08 84 c0 0f 85 48 0b 00 00 [ 877.376195] RSP: 0018:ffff888023ac73c0 EFLAGS: 00010256 [ 877.376804] RAX: dffffc0000000000 RBX: ffff88800ed72340 RCX: 0000000000000000 [ 877.377613] RDX: 0000000000000000 RSI: ffffffff829518be RDI: 0000000000000003 [ 877.378419] RBP: 0000000000000000 R08: 0000000000000001 R09: ffff88800ed72588 [ 877.379244] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800ed72580 [ 877.380097] R13: ffff88800f1a6000 R14: 0000000000000000 R15: ffff88800c274000 [ 877.380924] FS: 00007f8bf3677700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 877.381828] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 877.382498] CR2: 0000001b2d123000 CR3: 0000000018a64000 CR4: 0000000000350ef0 [ 877.383317] note: syz-executor.1[7673] exited with preempt_count 2 14:55:02 executing program 7: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000002c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, 0xb1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000180)) [ 877.388279] net_ratelimit: 4 callbacks suppressed [ 877.388293] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 877.395924] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 877.398529] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 14:55:02 executing program 5: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x0, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:55:02 executing program 7: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x0, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x80000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1b0, 0x0, 0x0, 0x0, 0xee00}, {@in=@local}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 14:55:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x2000000) 14:55:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r0, 0xffffffffffffffff, 0xff0f0000) 14:55:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000000)={r1, 0x0, 0x4, 0x5}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @local, 0x4e}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$hidraw(&(0x7f0000000100), 0x58, 0x10001) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a00c2b0c87f0000000000000100000001000000722200000040000020000000e0f4655fe0f4655f011affff53ef010001000000dff4655f0000000000001e0001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080010dff4655fe0f4655fe0f4655d00ffffff7f00040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) getdents64(r4, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x80) dup3(r3, r4, 0x80000) [ 877.484287] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 877.488968] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 877.490978] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 877.505472] EXT4-fs (loop6): Unrecognized mount option " [ 877.505472] " or missing value [ 877.537880] EXT4-fs error (device loop4): ext4_fill_super:4954: inode #2: comm syz-executor.4: iget: root inode unallocated [ 877.542231] EXT4-fs (loop4): get root inode failed [ 877.543394] EXT4-fs (loop4): mount failed [ 886.815191] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) VM DIAGNOSIS: 14:55:02 Registers: info registers vcpu 0 RAX=0000000000000064 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8226e001 RDI=ffffffff87679000 RBP=ffffffff87678fc0 RSP=ffff888023ac6dd8 R8 =0000000000000000 R9 =ffffffff8544fb4f R10=0000000000000000 R11=0000000000000001 R12=0000000000000064 R13=0000000000000064 R14=ffffffff87678fc0 R15=dffffc0000000000 RIP=ffffffff8226e058 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8bf3677700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d123000 CR3=0000000018a64000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=cc80000000000000 4007 FPR6=cc80000000000000 4007 FPR7=cdc0000000000000 4008 XMM00=00000000000000000000000000000000 XMM01=00000000005487a800000000005487a0 XMM02=000000000000000000000000000000ff XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffffffffffffff XMM05=ffffffffffffffffffffffffffffffff XMM06=000000000000000000524f5252450040 XMM07=00000000000000000000000000000000 XMM08=5f6d6f6f2f666c65732f636f72702f00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffff88804801fe88 RBX=0000000000000001 RCX=ffffffff85a0a2a0 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000001 RBP=ffff88804801f9a5 RSP=ffff88804801f898 R8 =ffffffff85a0a2a5 R9 =ffff88804801fe88 R10=0000000000030040 R11=1ffff11009003f1b R12=ffff88804801f9b8 R13=ffff88804801f970 R14=1ffff11009003f1b R15=ffffffff85a0a2a4 RIP=ffffffff81105826 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f89dbffe700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fd4e7413fe8 CR3=000000000ddba000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=cc80000000000000 4007 FPR6=cc80000000000000 4007 FPR7=cdc0000000000000 4008 XMM00=00000000000000000000000000000000 XMM01=00000000005487a800000000005487a0 XMM02=000000000000000000000000000000ff XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffffffffffffff XMM05=ffffffffffffffffffffffffffffffff XMM06=000000000000000000524f5252450040 XMM07=00000000000000000000000000000000 XMM08=5f6d6f6f2f666c65732f636f72702f00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000