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"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:35:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:35:25 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, 0x0) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:35:25 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:35:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x38, 0x3c, 0x101, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @u32=0xfffffe01}]}, @typed={0xc, 0x54, 0x0, 0x0, @u64=0x4}, @nested={0xc, 0x202e, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}]}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_PMK={0x14, 0xfe, "641277168c4ac1296f1225e537f21918"}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004041}, 0x881) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r0) [ 1245.369856] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=60 sclass=netlink_route_socket pid=7413 comm=syz-executor.4 [ 1245.399789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=60 sclass=netlink_route_socket pid=7415 comm=syz-executor.4 [ 1258.207239] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:35:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x700, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:35:45 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:35:45 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000100)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) fchownat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x3, 0x14800) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4, {0xffffffffffffffff, r5}}, './file0\x00'}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r8, 0x0) getgroups(0x7, &(0x7f00000012c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0x0, 0xffffffffffffffff, 0xee01, 0xee00]) pipe2$9p(&(0x7f0000001300)={0xffffffffffffffff}, 0x84000) r14 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r14, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) r15 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001340), 0x20080) r16 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='cpuacct.usage_sys\x00', 0x0, 0x0) r17 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$unix(r2, &(0x7f0000004c40)=[{{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="a2de7c868d04160c90b51d1129251995cabd8dbbc8e24680cd12cf97e8efaec64eaa11d21c38", 0x26}, {&(0x7f00000011c0)="d510d9e32509f90be316cf1d295f6a2c3417338708a8b27f20096c3f56118fa9576575dbfd2769e083dfd803b6c8d64d5131d97d56ba035379f5d7d07571c7cc0e6cf8e5fc0a3658292e86526300482e595d4e5ba5b9ea7c27a065ef38bdecad5618c2bc1620034829fbb2b1c8caa6b505756ece8d710767f50b713c3868629416cc5dc4ed9cde6abf0fb4cdc2036ce5bfaf84", 0x93}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3, r5}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r8, r10}}}, @rights={{0x24, 0x1, 0x1, [r0, r1, r13, r1, r14]}}, @rights={{0x20, 0x1, 0x1, [r15, r0, r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r16]}}], 0xc0, 0x800}}, {{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)="756c472b5161a3bc14defb0108c767d4a28263f6430808eb8c1e8b06a7f76a5b61407fe03f06e38bd730b27b81bde63806b13a064cf250550e0ae47a8db1784afd1a84ed0054d136eaf825d0810fee934c038c00c95bb0b73d8ec3a11237e02d7881aee32f558697a6dff245258bf3d8cfde6dc9e9e0c77620b9ef3b4686d9308f120d6468819b863704fea46d37f687987248b85d80566966b778ab915b9d2c6ac818c8be47a168255dae99", 0xac}, {&(0x7f0000001540)="9d040b76036f77be8b166681ed4a353abbf42a29f6af9148e602554808c5ebe7f35b221059ec13a0c4085e1fd9ec24df216a9f75b34149f542f37f49eed0b1d0ed6fb231eaf05294b589bfe1c8a0e55dc2ed5772e97d147da4f5d8a20c6f41d266275b81576939557063e1ac1be102922d154613940e549e9627036cc0ca531f453f6afa00ae157b6d823441bed0ea4f721a554d4f4f93d8da76c08675f9c7d9df1756bd6d4b7937c14b0351743ff4b3347d722e90806f24a51a0c7f701065b7c547ff0cfeb4ff728c5fe030984f25c5c600ea10b40689949812d31a49f62e474dd8173c2c1423cc454e693020", 0xed}], 0x2, &(0x7f0000001800)=[@rights={{0x1c, 0x1, 0x1, [r13, r6, r17]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r10}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78, 0x20004800}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001d00)="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", 0x1000}, {&(0x7f0000001880)="7e93422a636ab2561931362f13e0019220ec71ec359e5ff9dde7a567d14b3bcc15b7ea8fd54d0abab1a5562fbd5cdb5c3a90f204285d4bdd408b62acb848f517f60d4a016bc37032987f8dbbde6d8dc557857943469817c7744c0a917054ea48aebe88244622627c7fc076020c3b9bf0b058adfea8bff34354445b826f261244d25122763c8bbf81d4ee1d0b3d3d3d1e20bd063c2fb2813e0f5c57326239d14a4a23c4cd25a3152621ce7e0bb54dd27759f595fcd73e30d0ff891d4703dac234d6af760e71852d9db63972a60b5c67efda6c19969fc15c786091ec0fc48c19c789dacae9edec", 0xe6}, {&(0x7f00000019c0)="aae7b49aa2d5f807a01094b450ae0927f0e878ae8a72a3cf97efca1e646008f3963bc172dc6d1cfece369e53eba03d5233499205344f1c8127bf4d22fa8bce253aaa5ad05d58074a8ef62215d15fe37e55719722b6ed00b26609ea26c7b29b2ac6ef72d8f7478572dc9600b65a91990b2d552137c9f686596a47b62aaf531d111d1784986d3b7a1fb9c1cc0b28edf3d58d88e2f51cc761ddf6d47d4056f6e02cddac7b372324c29689482f3122ed08713e67a0b7861a880898d279476a6779dbe5df5f2e86e922e696374eba2ee2312a826aa905ba6e502ccb237069d8704976551524911e1b47553ed3a528ea2faff79168da9e63e3c2", 0xf7}, {&(0x7f0000001ac0)="0f99f8ae6d72561d3bc632605d8cfaecc51eea1ad54a9c9833ce955dc75369a0559a36a3be120219dff7846f9ebf9b352ea01ed6d280820fcdfeacf71092b46586ba975c718c7f1e89b89ac09361cc8d23be5748d4e903511be6b9ff12c6807f46ffc039eb72ea482c482d2d78a484411cba91316281e4d6cc0e239bbb8b56e2b14e01193d95bc9434d5c1d67a0218927fe63b6f63e0cf494e9c6cc8dd4fbe763b2f36de56b5c98671daf1bef9d6038f37587055d7968351ab3140c37bec90de3881ed24bc74277e877e0c8182", 0xcd}], 0x4, &(0x7f0000004b00)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r7, r9}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r11}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r10}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r12}}}], 0x140, 0x1}}], 0x3, 0xc0) 07:35:45 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:35:45 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:35:45 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:35:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0xffffffffffffffff) setxattr$security_ima(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f0000000080)=@md5={0x1, "97c3c85374a25d3e4cbc03813a67a4f9"}, 0x11, 0x2) 07:35:45 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, 0x0) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:35:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x20, r2, 0x1, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000000)={'wpan3\x00'}) 07:35:45 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:35:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x288200, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x8a8, 0x22, 0x300, 0x70bd25, 0x25dfdbff, {0x4}, [@typed={0x8, 0xd, 0x0, 0x0, @pid=r2}, @generic="14caf9858ebe6200776ce9056658b82a26f347b7cfb6a682f78d74109ffd8a407fd0b7ebbdbcb207b2d6143497adca61db5b62f6b7bbd0fc0f934e60801a9925f9bda548a87c3f9a8ac1f5359cee3f6c71de4e9a6924dd57a2c166b57a7109949e8b2919acf474126c45e18c0c8f1a5dab2761a828c7f27060e0eeb5ff0a0b7f9d85f52aa278c6365783909592138730eaca48b5507593daecda8597f07a82325ef9615b640b08cb47e45c0362c0b51be59bf3b7c710fe93", @nested={0xe3, 0x60, 0x0, 0x1, [@generic="2e11ac88f78fed2ad8293dd60cdd0e1dda926f81", @generic="3dd3730480e8b995a8a8a165127a", @typed={0x4, 0x2f}, @generic="fc405c37626db06391faaa73d260aff720e79f020e1e8e497ca498e872805e8d457c83fd15c62a81432f0dea3014337de45393fab9d3d4dd180385801b830570532caf6a3b6cdc64f53b5a7a275a8f9844c2ef7f57ec1aa8098ba4f4a08cd24fef48b0cdf960cbeb8f6707342ab83e2430e4250cc246f297efa610d3ab063a93ec8ce04c467a8c47f354aad5554096f4a2fda846316d8c647351044e3e34518c3934df96ac511cec7eff1d7627f095f37f5a6cd25fde6201a7"]}, @nested={0x2db, 0x96, 0x0, 0x1, [@generic="e56b0dcea98509d596b8d7708ee0935e7e114a456ed52775886e25abc54ef94b335b969be613f214a72d4f6538944562c57c8c78354df33509595ade30fce91a45d0f10ff4e4a89c7c97300644064460495a7f8370d5d904aa9e27366d9cadc50b6c89f990b999bc2219", @generic="0ae97b73fb5eabfd7efbfdf0326b03690445aff12e8c0a0636095dd563b21ed3a449e9b27d4bf273d4e0a6d10f5ca15e160f00e4a18e196257a1043e39f5af08852486bf334737bedbadb0cb984183229603c5c34edb64cc85b3b911a720248e16a856e8aae90c66a6524f2a43027ec2df5667490abbfa818ed8bf13826fd1ced518c2fa3b186942537f", @generic="35d4dedcf37ded2bc1f4f23c3f559d6b4a2d1b549ec292471436969bf56ab6846dd77b996030e3743cedbe350b7ef81803b7bf4d7ee3157b11e7107aeedfee2dc43fe0bac7a35b27d8f0843e193a1a665dbc9fe517ceb63987", @generic="77d13d94b5bac20c0104ff5d88912ff9cc69f1d476507344a88bd428471c69129259ca60edc11e0af2a3111ca3ff1010f85c1efca12096703953f5b885bb7fd618c25a16bfea804055ad7aad28bfc5d383d7c7b8af5eb07da4597d8939778ce3b52e4ababcf2c4ceb0a6caef413268d20e2a941e2b3b3df56be0ddc7d45c80508b240c3d578b5ffbf30c4c23046433c036eb93ed3281d5aef9ff70d4aeb09b0e6027af5c333dcb2ea1035262424d93fa92a3c33b7e419724cf8a6c943c94a0f977d241294c967396e1e5b6e6f2ea8bd632ea0cb32db308e826c4a335798a2bf38798b82df8996410696b621599880e000fe15e", @generic="9ebf1cc94aa325a01d6d95a4f83af198fdb650fd3ac307303e29c90e891504449b566a80164aa3f767576e54d7167f3c9e6d8fdbe76ac42e305b26398619c52556636cb8209d95d94d034501b578dbd11d808b7e23e6c77aa0277395598a1c04f1c5a09e07fa3198949ed72d75eeee1dfa5e43b0c60783ca3026a0d84898d446fcad4a24a1289a3fb063d0ff5cff22954082a55c0e6ad1"]}, @nested={0x21a, 0x8a, 0x0, 0x1, [@generic="97167738146708fbf08f9198e4afdea0feee11083c129f60a40b3bc3f0b560379999002840aa5d3c04bfa1d79ae992d948f9081a53b3897a624ddbad1becca90a0f25891de255c2d0f31ef935f5070cf5f30fb1804b29b1a27fec66f7cd363a67b7edbdc8d93663b931c7774923c0af40b9818dd5dc3321042670ced9b78e2454efa9dcc33937f93f6ec", @typed={0x14, 0x48, 0x0, 0x0, @ipv6=@private0}, @typed={0x8, 0x81, 0x0, 0x0, @ipv4=@broadcast}, @generic="f88e1917663e5f6813357ab7354f41b8aa9fe66d18f8b0290e45df10f2caa0fb8f8c60926007c902ec3e6262a3ea17d90d23ecdcc27f6a38355af251ef515b404528ab4fa8bfeefbfe20b90679d59a14942651b0ab4b087647a9dc6a85565f53b256dc4abceb2ec1aa4e3f0e3d3d2d68da767af5bd6b5c5a1d96cf0a7396804f78cb01d3376b3f7c6740fc96437bc75aada47959a677bfc7d1edadd7a02839ed94042619c7c9b9495f91069e8d5ec0457d10cb09792b61f74d65caf5108025c6e9c811d56e3157a1bad5b49b431da99f31a03812552f055c5dd9dba2ce812f", @typed={0x5, 0x8b, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x1e, 0x0, 0x0, @fd=r0}, @generic="60d5b800995cffe3f864fce8516c0599ab87ad0b379959ab323007328905c0dbdd0f362681c52e53e0357a73e0ea9f86f3b701b4dfdf8128ddcff17fd1829d3c534702fc0684fd5bb156bea771f9d61e75af94aa7567d6d03e3991f8f981dc0ec6792440a493934b9aa10b235d5a844bea7a22ea611cb0c8499e52ed0334eca5a6"]}, @nested={0x170, 0x18, 0x0, 0x1, [@typed={0x8, 0x50, 0x0, 0x0, @ipv4=@empty}, @generic="312c8737020706ff7e23fb1d57bb46b2d1040c3d3a80d0c4a9d8f129eb4e6cffbf348f18081c188c06038928baaa71b7be5feaf1517fcc6d5b605bac4e85d6f6f19939bb8cc5deaa67aa3887f78f9911cfbc8fca64995b4bae64af3d54b9758f89b46af667074e25b6922be3af2256302f38cb5eee691e3b2d7977578aa007dd5d041d77094be01b7901", @generic="a9ea78d8ff5da711a2b6b978b1ad31dcbcc969342100b3658e6822b9aec0b1fb2097d6cad472e57282176351dea33bd05c86876a87f035dcedf412889c51877388d3b0a320c27cde71d56ab3d9735c8d6bab1fede6e5de4b82ebec4d5b122aed8869c61158d882692000ceea4f21b482cfb1d87dd1950624249231c65f5802f955d6b41e587d38e34e0f7d4628ff66a2ad1b9a6528e057fa25af916ff8180066297bd4d936af84d6747872a99cd2949b512bc0308a61bd28bcbf48d59c5df2f0c94c30a4961293610385a57c5558", @typed={0xc, 0x16, 0x0, 0x0, @u64}]}, @typed={0x8, 0x54, 0x0, 0x0, @ipv4=@local}, @generic="f84aa0cc1fc1bff5022d129aa849a70efd3d2fcc38503c7853", @generic="50d8b4af1185d1a52f42e87a22a616359ce64dd811845567701cfb872de110a484d451c64c35489d721b746334d60738b8adf38c043377e3e7248e6c34cf818fa612d9707ffed2b304f39a9806baa9d7014c95be74d99ddf0061cb6e7639e21c6c5aec644eab20"]}, 0x8a8}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x34, 0x18, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}, @nested={0x18, 0x15, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@dev}]}]}, 0x34}}, 0x0) 07:35:45 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:35:45 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1265.347473] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 1265.358726] netlink: 'syz-executor.1': attribute type 21 has an invalid length. 07:35:46 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, 0x0) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:35:46 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1279.814894] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:36:09 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:09 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x900, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:36:09 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:09 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:36:09 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:36:09 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:09 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, 0x0) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:10 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:36:10 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:10 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:10 executing program 1: syz_io_uring_setup(0x6863, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x1, 0x264}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000008300), 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000008300), 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x2275, &(0x7f0000000080)) 07:36:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000002080)=0x1f, 0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) write$binfmt_elf64(r2, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x4d, 0x1, 0x1, 0x3, 0x3, 0x3e, 0x822d, 0x232, 0x40, 0x35c, 0x9, 0xff, 0x38, 0x2, 0x1ff, 0x8, 0xfa}, [{0x60000000, 0x6, 0x4, 0x5ad9, 0x100, 0x1, 0xffff, 0x7ff}], "f14056808ea79f9c555907db", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x584) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) 07:36:10 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1289.432889] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:36:10 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:10 executing program 1: ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'geneve1\x00', {0x2, 0x0, @loopback}}) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000140)="a17ca5aade2b227f21cc7a45dea1c3bc721f9f7b352aa0cf75ed99", 0x1b}], 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1d, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 07:36:10 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1289.674919] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1301.565957] kmemleak: 35 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:36:30 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xa00, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:36:30 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:36:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x28, 0x32, 0xc21, 0x0, 0x0, {}, [@typed={0x14, 0x1, 0x0, 0x0, @ipv6=@empty}]}, 0x28}}, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)={0x28, r1, 0x621, 0x0, 0x0, {}, [@NL80211_ATTR_REG_RULES={0xc, 0x22, 0x0, 0x1, [{0x69}, {0x4}]}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x200, 0x70bd2b, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4044004) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r1, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x80000001, 0x11}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) 07:36:30 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:36:30 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r3) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000002100000009001f00706979311b00000005002000000000000c0005"], 0x34}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r6) sendmsg$IEEE802154_ADD_IFACE(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000002100000009001f00706979311b00000005002000000000000c0005"], 0x34}}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r9) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="010000000000000000002100000009001f00706979311b00000005002000000000000c0005"], 0x34}}, 0x90) r12 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r8) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="34010000", @ANYRES16=r12, @ANYBLOB="010000000000000000000d0000000600080000000000050007000000000006000a00000000000500170000000000"], 0x34}}, 0x0) [ 1309.609943] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1309.614889] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1309.635071] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 07:36:30 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:30 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:36:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f00000002c0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="3e3fc2db0956", 0x6}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x24, 0x2a, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@typed={0x4}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="999e00009c"]}]}, 0x24}}, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/29, 0x1d}, {&(0x7f0000000040)=""/193, 0xc1}], 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x2000, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup2(r3, r2) ftruncate(0xffffffffffffffff, 0x1000003) ftruncate(r2, 0x3) acct(0x0) unshare(0x48020200) 07:36:30 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:36:30 executing program 4: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3cd04d6b66732e66617400020801090470000000f801", 0x17}, {0x0, 0x0, 0x1000a04}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r1, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000001000000180000005fa1ba7ae3f4d85cdc8e81e0a99a2f3e6eaec1bfdc0a2c57b6366f7dfc9515b7f3f3528e8f533486fc62b6c7f2e8ec4f5ea3", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_register$IORING_UNREGISTER_EVENTFD(r4, 0x5, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE, 0x0) 07:36:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:30 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1309.800241] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1309.925533] perf: interrupt took too long (8009 > 8003), lowering kernel.perf_event_max_sample_rate to 24000 [ 1323.940111] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:36:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xb00, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:36:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:53 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:36:53 executing program 4: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3cd04d6b66732e66617400020801090470000000f801", 0x17}, {0x0, 0x0, 0x1000a04}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r1, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000001000000180000005fa1ba7ae3f4d85cdc8e81e0a99a2f3e6eaec1bfdc0a2c57b6366f7dfc9515b7f3f3528e8f533486fc62b6c7f2e8ec4f5ea3", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_register$IORING_UNREGISTER_EVENTFD(r4, 0x5, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE, 0x0) 07:36:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:36:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1332.523647] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:36:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:53 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:36:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:36:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:36:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1332.678197] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:36:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1344.954593] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:37:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:21 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:37:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c00018089000300000000000500000000000000000000001400040000"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:37:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1020, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:37:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1360.901191] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:37:21 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:37:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c00018089000300000000000500000000000000000000001400040000"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:37:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:37:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000040)={0xffffffff, 0x5}) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) write$binfmt_elf64(r1, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0x0, 0xdc, 0x2, 0x3, 0x2, 0x6, 0x3, 0x133, 0x40, 0xa2, 0x400, 0xff, 0x38, 0x2, 0xffff, 0x81, 0x5}, [{0x4, 0x3, 0x7ff, 0x1, 0x1, 0xffffffffffff7fff, 0x7fffffff, 0x8}], "65fc231b4fd15cd46d8ce2ea4335d216d9855a4148971e9f85cbd342396e02e317d16c54599382c601f3d0f39a8f9d226fd5257dc5f8eac99e7a801b1e4d420d1ad41608642cacc267a25d4b7a579769b0004b0a1dd1e2bc1f79cabf172b656f0daf79ecfb954806f3e7fc2fc7bfd9ab959ac68472748913ff106e4a2c58875bfd11ef43415ab30190fddb6427d5ba26c9f564b94e81b7e780c3022ef53030f09aa68ae5a4373e597e86c1529310acedf8028e8010df6a62106788a53c3543fa14a8cc", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x73b) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) r2 = dup(0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000000000140004000000000000000000"], 0x50}}, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r5 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r6 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r5, {0x19}}, './file0\x00'}) [ 1361.172683] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:37:21 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:37:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1361.286844] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1361.304735] EXT4-fs (loop0): get root inode failed [ 1361.306748] EXT4-fs (loop0): mount failed [ 1376.100989] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:37:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000000c0)={0xa, &(0x7f0000000080)=[{0x7, 0x3}, {0x595, 0x6}, {0x7, 0x7f}, {0x5, 0x80}, {0x3, 0xd6}, {0x100, 0x9}, {0x7, 0x7}, {0x8000, 0x1}, {0x6, 0x6}, {0x400, 0x8}]}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000100)) dup2(r1, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x20, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x15d}) dup2(0xffffffffffffffff, r2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f7", 0x66, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00f02a02af072957c57ac4e6e65ac7674df1479c838b2f43a34730"]) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') 07:37:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:43 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:43 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c000180890003000000000005000000000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:37:43 executing program 4: syz_io_uring_setup(0x69d5, &(0x7f0000000280), &(0x7f0000000000/0x3000)=nil, &(0x7f0000003000/0x1000)=nil, 0x0, 0x0) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffffff8}}, './file0/file0\x00'}) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE, 0x0) syz_io_uring_setup(0x495e, &(0x7f00000002c0)={0x0, 0x3750, 0x1, 0x3, 0x229, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000380)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000000040)=0xace, 0x4) syz_io_uring_submit(r2, r1, &(0x7f0000000540)=@IORING_OP_WRITE_FIXED={0x5, 0x5, 0x2004, @fd=r3, 0x200, 0x10000, 0x0, 0x16, 0x0, {0x2}}, 0x891c) syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x2800) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000753000/0x1000)=nil, 0x1000, 0x2000008, 0x1010, r4, 0x2e7ac000) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) r5 = io_uring_setup(0x5204, &(0x7f0000000040)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r4, 0x9408, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r5, 0x5, 0x0, r6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd, 0x0, 0x0, 0x6, 0xc, 0x0, {0x0, r6, r4}}, 0x6) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5, 0x0, @fd, 0xf9, 0x0, 0x0, 0x2}, 0x5) 07:37:43 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:37:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2010, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:37:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1383.216618] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:37:43 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:37:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:37:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xedc0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:37:44 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1383.350437] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1383.360824] EXT4-fs (loop0): get root inode failed [ 1383.361683] EXT4-fs (loop0): mount failed [ 1383.387034] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1383.395977] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1383.499978] EXT4-fs: failed to create workqueue [ 1383.500089] EXT4-fs (loop1): mount failed [ 1383.502411] Process accounting resumed [ 1383.545177] Process accounting resumed [ 1395.208259] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:38:03 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:38:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000000c0)={0xa, &(0x7f0000000080)=[{0x7, 0x3}, {0x595, 0x6}, {0x7, 0x7f}, {0x5, 0x80}, {0x3, 0xd6}, {0x100, 0x9}, {0x7, 0x7}, {0x8000, 0x1}, {0x6, 0x6}, {0x400, 0x8}]}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000100)) dup2(r1, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x20, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x15d}) dup2(0xffffffffffffffff, r2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f7", 0x66, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00f02a02af072957c57ac4e6e65ac7674df1479c838b2f43a34730"]) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') 07:38:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xff00, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:38:03 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:38:03 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x8880, 0x0, 0x0, 0x0, 0x40a, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x13) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="3e3fc2db0956", 0x6}], 0x1}, 0x408b152a1df418c6) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000002a0001000000000000000000000000000400000009000080999e00009c0000007f399f822f97170e051e9f2c823278382dcdec5382a60d62d7cdca92f4ca72d3afd66f0ebab559d7195f8f30c6a37fb718e096725f63965d478034cb04874f43b135848345207fdcfe8d7afe6cb6a27423f5a3b9977cf2136d065ef3c35fec2a316686629afefe25d1272809388a1ab9a97c768d3dd43ce33122e2fe546d1e5ed9dc181d581de668035362c18b6377332419635b9809b4f4056ecdb8320b"], 0x24}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x2000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 07:38:03 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1402.913010] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:38:03 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:03 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1403.002125] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1403.004258] EXT4-fs (loop0): get root inode failed [ 1403.005120] EXT4-fs (loop0): mount failed 07:38:03 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c00018089000300"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:38:03 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:38:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:03 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1403.196594] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1403.202516] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1403.206266] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:38:03 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1403.272213] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1403.276123] EXT4-fs (loop0): get root inode failed [ 1403.276762] EXT4-fs (loop0): mount failed [ 1403.325552] Process accounting resumed [ 1416.333248] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:38:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:38:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x80000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:38:25 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:38:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:25 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:25 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:25 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1424.997733] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:38:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = dup(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000080)={@local, 0x78, r2}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r3, 0x100}, {r1, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:25 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:38:25 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1425.159226] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1425.161748] EXT4-fs (loop0): get root inode failed [ 1425.162350] EXT4-fs (loop0): mount failed 07:38:25 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a00"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:38:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="f8f4a78b6c29fd960e83d4ebfa998f937079f69e317a26fdc07262", 0x1b) io_setup(0x9, &(0x7f0000000080)=0x0) io_submit(r1, 0x0, 0x0) [ 1425.226135] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:38:25 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:25 executing program 1: r0 = syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x4c, r0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffff}, @SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) dup(r3) sendmsg$NL80211_CMD_SET_QOS_MAP(r3, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0xfc, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{0x9, 0x2}, {0x4, 0x4}, {0x6, 0x6}, {0x3, 0x7}], "b7ff783797fffa9c"}}, @NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{0x20, 0x4}, {0xc1, 0x3}, {0xfc}], "8f59703a665deb81"}}, @NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{0xa5, 0x1}, {0x81, 0x5}, {0x9, 0x7}], "d3b05cf88de0355d"}}, @NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{0x99}, {0x9, 0x5}, {0x2, 0x6}], "8fec7d8be7ae909f"}}, @NL80211_ATTR_QOS_MAP={0x2e, 0xc7, {[{0x81, 0x5}, {0x8b, 0x7}, {0x3, 0x1}, {0x20, 0x6}, {0xf7, 0x1}, {0x3, 0x4}, {0x80, 0x7}, {0x80, 0x5}, {0x6, 0x1}, {0x1, 0x7}, {0x7}, {0x6, 0x7}, {0xff}, {0x1, 0x1}, {0x81, 0x3}, {0x43, 0x6}, {0x1}], "5ad1a3952910401c"}}, @NL80211_ATTR_QOS_MAP={0x2e, 0xc7, {[{0x26, 0x1}, {0x40}, {0x7, 0x3}, {0xbb, 0x3}, {0x6, 0x1}, {0x6, 0x7}, {0x3, 0x4}, {0x6, 0x2}, {0x8, 0x6}, {0x5e, 0x7}, {0x0, 0x2}, {0x3}, {0xda, 0x7}, {0xe0, 0x1}, {0x1, 0x6}, {0x2, 0x2}, {0x9, 0x3}], "42a7f0c73bc792f3"}}, @NL80211_ATTR_QOS_MAP={0x36, 0xc7, {[{0x7f, 0x7}, {0x81, 0x2}, {0x5, 0x2}, {0x3, 0x4}, {0x1, 0x5}, {0x1f, 0x3}, {0x1, 0x6}, {0x9, 0x2}, {0x6}, {0x81, 0x5}, {0x3, 0x7}, {0x4, 0x3}, {0x1, 0x6}, {0x9, 0x4}, {0x7, 0x1}, {0x1, 0x3}, {0x87, 0x4}, {0x7, 0x1}, {0x7, 0x3}, {0x9, 0x5}, {0x8}], "0f9be5178adc9e38"}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1425.323157] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:38:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:38:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a00"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:38:25 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1425.419669] blktrace: Concurrent blktraces are not allowed on sg0 [ 1441.670337] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:38:49 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = dup(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000080)={@local, 0x78, r2}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r3, 0x100}, {r1, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:49 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:38:49 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r0 = openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x7ffff000, 0x811) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x48000) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000180)) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) 07:38:49 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:38:49 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:38:49 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a00"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1448.779686] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1448.872750] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1448.878555] EXT4-fs (loop0): get root inode failed [ 1448.880040] EXT4-fs (loop0): mount failed [ 1461.224095] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:39:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x7000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:39:10 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = dup(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000080)={@local, 0x78, r2}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r3, 0x100}, {r1, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:10 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x0, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:39:10 executing program 4: mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x69, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x20, 0x9, 0x8, 0x8, 0x0, 0x800, 0x804, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x8008, 0x5, 0x7, 0x3, 0x3c08, 0x1, 0x0, 0x0, 0x9, 0x0, 0x3}, r1, 0xe, r0, 0xb) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) getpgrp(r2) r3 = getpid() pidfd_open(r3, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x124, 0x7, 0xa, 0x5, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NFTA_RULE_COMPAT={0x34, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x8035}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x3a}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x73}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}]}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x3a}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0xf9}]}, @NFTA_RULE_EXPRESSIONS={0xa4, 0x4, 0x0, 0x1, [{0x9c, 0x1, 0x0, 0x1, [@cmp={{0x8}, @void}, @quota={{0xa}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x3f}, @NFTA_QUOTA_FLAGS={0x8}, @NFTA_QUOTA_CONSUMED={0xc}]}}, @osf={{0x8}, @void}, @nat={{0x8}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_NAT_REG_PROTO_MAX={0x8, 0x6, 0x1, 0x0, 0x1}, @NFTA_NAT_TYPE={0x8}]}}, @counter={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x26}]}}, @tunnel={{0xb}, @void}]}, {0x4}]}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000840}, 0x80) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = dup(r4) dup(r5) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x20, 0xb5, 0x8, 0x40, 0x0, 0xfffffffffffffbc1, 0xa114, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3454, 0xa}, 0x844, 0x1, 0x3, 0x5, 0xfffffffffffff000, 0x7, 0x7f, 0x0, 0x7, 0x0, 0x1ff}, r3, 0x10, r5, 0x1b) munmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) 07:39:10 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f00000010c0)={@dev}, 0x14) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) r3 = dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000000000140004000000000000000000"], 0x50}}, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x23, &(0x7f0000000080)="66c1d3e6006f3926b1a585dd771d613dbf2730c08cc2b9c6c63ea17344cea209cd44eaa2ab3c893c41b3a2d0042d9e4c301783ee0362170e4548c8c9bf9a0139df7093bad1a1c8a50bb1bd0cbf99d7493ce1403a2ada915c3845aac7f046e2475875c531dafb5e25b7ecd8220f70b376e2dfa202c776e4c5c9bcbdf740961155b37aec7855afd52bf08df24e5bcf021dda3bfea8e71ef9b4f5b8ee8e61b88607e17da78fd29b24291e448f9ff6269a3c6723e3d5a1166783edb19b568702822978fde267754b09738ce12825dfef373648671ad9a5b3f5b00e9b681014235b83", 0xe0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@mcast2}, 0x14) 07:39:10 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:10 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b0000"], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1469.540245] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1469.547698] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 07:39:10 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:10 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:10 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1469.654206] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1469.670797] EXT4-fs (loop0): get root inode failed [ 1469.672174] EXT4-fs (loop0): mount failed 07:39:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) getdents64(r0, &(0x7f0000000080)=""/15, 0xf) ftruncate(r0, 0x1000003) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000100)={0x0, 0x6, [0x0, 0x100000001, 0x10000, 0x0, 0x0, 0x1]}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) openat(r0, &(0x7f0000000040)='./file0\x00', 0x40400, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x10}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:39:10 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:39:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) pread64(r4, &(0x7f0000000600)=""/194, 0xc2, 0x7fffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="748cb4f94379b0820300f2110906213c451bac25228069000080041ead1fa3cfeca33161000000000000000000000000833db0de0a5661d2f18baaf980ecb14a007994598563c47a8f95936b0944f2d2d160b2ae70611e24c2c996ae"], 0x28}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x1, 0x4, 0x401, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFULA_CFG_MODE={0xa, 0x2, {0x1, 0x2}}]}, 0x20}, 0x1, 0x0, 0x0, 0x815}, 0xc0) sendmsg$NL80211_CMD_JOIN_IBSS(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x2c, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_IE={0x4}]}, 0x2c}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000700)={0xcc, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x8001}, {0x6, 0x16, 0x43f}, {0x5}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x1}, {0x6, 0x16, 0x2}, {0x5}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x4}, {0x6, 0x16, 0x8}, {0x5}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x7, 0x21}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x48011}, 0x4040010) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="500000001e0001010000000000000000ac141ffb000000000000000000000000000000000000000000000000000000000000f795251f9fbb42e4b5c000000000d9b7a6e6dd550000000000000000"], 0x50}}, 0x0) sendmsg$nl_xfrm(r9, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) 07:39:10 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1469.789962] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1469.800764] Zero length message leads to an empty skb 07:39:10 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB='P\x00\x00\x00'], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1469.855830] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1469.974292] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1469.979698] EXT4-fs (loop0): get root inode failed [ 1469.980843] EXT4-fs (loop0): mount failed [ 1482.884181] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1490.330068] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:39:31 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB='P'], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:39:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:39:31 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:39:31 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:31 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:31 executing program 4: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:39:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x22902, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10) accept$unix(r1, 0x0, &(0x7f0000000340)) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) fallocate(r2, 0x2e, 0x8778, 0x164c2aa0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000380)=ANY=[@ANYBLOB="864b67e3acd094b333919c40170c236963b36ef0e373f439ec9479afc28664631f3c15a16e5029515ee14973dc40c92ed92a166d5b62528e49bb0ddda5faa6bbf66c8c70a7bffbe121c220135bd099cabccd00"/98, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0/file0\x00']) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x9, 0xff, 0xff, 0x5e, 0x0, 0x5, 0x202, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40, 0x4, @perf_config_ext={0x4, 0xffffffffffffffff}, 0x40, 0x401, 0x5, 0x0, 0x9, 0xfb, 0x1, 0x0, 0x1fe, 0x0, 0x3fffffffffffffff}, 0x0, 0x9, r3, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000280)={0x13, 0x32, 0x0, 0x8, 0x9, 0x7, 0x6, 0x140, 0x57c371147aca7cca}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffff0ef, 0x11}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, r4) fcntl$dupfd(r5, 0x406, r3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff01907103c1df3928cb15b27437eb6e994", 0x89, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00']) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x8, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) copy_file_range(r0, 0x0, r0, &(0x7f00000000c0)=0x6, 0x6, 0x0) 07:39:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1491.198518] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1491.213718] EXT4-fs (loop0): get root inode failed [ 1491.215327] EXT4-fs (loop0): mount failed 07:39:31 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:31 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r3, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1491.294866] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1491.318128] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:39:32 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:39:32 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r3, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:32 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:39:32 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:32 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1491.651049] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1491.664721] EXT4-fs (loop0): get root inode failed [ 1491.666116] EXT4-fs (loop0): mount failed [ 1505.234147] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:39:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r3, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 1: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:39:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:39:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x9000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:39:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:39:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:39:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1512.577654] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1512.590884] EXT4-fs (loop0): get root inode failed [ 1512.591821] EXT4-fs (loop0): mount failed 07:39:53 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1512.641433] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extra_isize 22181 (inode size 256) [ 1512.646678] EXT4-fs (loop4): get root inode failed [ 1512.648171] EXT4-fs (loop4): mount failed 07:39:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(r4, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r5 = dup2(r0, 0xffffffffffffffff) unlinkat(r5, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:39:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:39:53 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:39:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1513.025667] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1513.056951] EXT4-fs (loop0): get root inode failed [ 1513.058883] EXT4-fs (loop0): mount failed [ 1525.695228] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:40:15 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, &(0x7f0000000200)={0xfffffffffffffff7, 0x1}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r4 = dup2(r0, 0xffffffffffffffff) unlinkat(r4, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:40:15 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xa000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:40:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}, 0x0, 0x0, 0xb67}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x20000000000000) mount(&(0x7f0000000040)=@filename='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x200080, &(0x7f0000000100)='!^!*[%-\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = pidfd_open(0xffffffffffffffff, 0x0) ftruncate(r3, 0x25) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x81) 07:40:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:15 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:15 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:15 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x0, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:40:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1534.500367] binfmt_misc: Unknown parameter '!^!*[%-' 07:40:15 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:15 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:15 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x0, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1534.640275] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) 07:40:15 executing program 1: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x0, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1534.685686] EXT4-fs (loop0): get root inode failed [ 1534.687515] EXT4-fs (loop0): mount failed 07:40:15 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x0, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:40:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:15 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1534.949261] binfmt_misc: Unknown parameter '!^!*[%-' [ 1534.962467] syz-executor.4 (9344) used greatest stack depth: 23736 bytes left 07:40:28 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xb000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:40:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = dup(0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x39, 0x2, 0x5, 0x0, 0x8, 0x0, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x1, 0x3, 0x7, 0xfffffffffffffee6, 0x78d, 0x40, 0x0, 0x9, 0x0, 0x5}, r2, 0x10000000000009, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00'}) 07:40:28 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r4 = dup2(r0, 0xffffffffffffffff) unlinkat(r4, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:40:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:28 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:40:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1547.793257] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1547.796153] EXT4-fs (loop0): get root inode failed [ 1547.797054] EXT4-fs (loop0): mount failed [ 1563.455483] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:40:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x10000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:40:52 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:40:52 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000280)={0x0, 0xffff, 0x8, 0x4b7, 0x10001, 0x200}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:40:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000780)={{}, {0xc60}, 0x80, 0x0, 0x0, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)="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", 0x188, 0x0, &(0x7f0000000580)={0x2, 0x105, {0x0, 0xc, 0xf2, "5b2d0767b95d0c06ab6bf6af62c2cf44ad10cc1aab8e6b16b62515135e84715e6b75a7a5d7b61fbfd40d3263342552cce5c3ca530c9c42ed2f7231f2d930213f0ed0468cd1338436d2b0785d3c41fcb2f9f9b1236c30b203d6f2700c0e6ae6c47ae59ebf310aa7f5c5e7c31d4a7d0f551a4e150c26edfb7c1561926999c014fdeb4d328857658eb4231de44118fa8b169c994d528686d615d3dca733ea0d2994ccc39dd74f66289b5b404cdd44b761eb96ab31b31e6ea7bdc899e49c30e0f9fbf0fbb6ecf7a18b92dfb1569cb0b7420d14804e0485e9887fc187929cb9bd95fbe20d8d14b9b912cca08e4b55b78c58952c74", 0x6, "100220285de2"}, 0xd8, "27d2aa8ed8911fc138a3df12b7f455b742d020a2f1a785549e1b3307966384b64c5e33204f5bba52defbfa9f1badace52b11b8167dbf26fcfab456bb0198ea7f08786cc9025556335137ee1e90d64b6ec1eb39aceef7155dff00acde4d61be59ad11658d1795e47252a48b8eaff782967b63ea2f037c7a0bc9b19b015280ba0a6d2bfdb3445158845160adcbb9a14493a6dddb513ba05afec89902b574005f96f0cc9bf00204b18289004bb6ab394d7715c5b5a2280b5b6ffc2e92ccba89eef6686a22a0ee5da4ec88c207a00621335fef4cc6c739232a15"}, 0x1e9}) chdir(&(0x7f0000000040)='./file0\x00') r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000008c0)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r1, &(0x7f0000000800)=0x80, &(0x7f0000000840)=@phonet, 0x0, 0x800, 0x0, {0x0, r2}}, 0x7330385c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0xe8}}, './file1\x00'}) connect(r6, &(0x7f0000000280)=@hci={0x1f, 0x0, 0x3}, 0x80) openat(r5, &(0x7f0000000200)='./file1\x00', 0x0, 0x10) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r5, 0xc018937a, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000100000016a8a6a75dfff13aaa7f00000000"]) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r7, 0x0, r5, 0x0, 0x200f5ef, 0x0) r8 = accept$unix(r3, &(0x7f0000000980)=@abs, &(0x7f0000000a00)=0x6e) sendmmsg$sock(r8, &(0x7f00000015c0)=[{{&(0x7f0000000a40)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e24, @multicast1}, 0x1, 0x2, 0x0, 0x3}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000ac0)="ab2251c1e8706f0f84e3ee2fbff8e3770fa56520934edd3deb941ec4c71cea22822d2c324dcfd565ed5e9cd7ec7f95eab3271eb23c0322a91b465be2fc892f88c6cb8d79a32358b37da6397477c03cef0369cad9843e1c02998bcc200449b2156cab827b6931245d357eeccfd73c8c4c91c9fe5a5c234fc18490e9e92220ac3897fd696ed9de65501f855e40bd00e7f028538696c9abe6f6e71e086043b023f41c86b5a8", 0xa4}, {&(0x7f0000000b80)="ef8b5af52e3a78bf7b185b723be381ccf7bc9d1b4a5ea733d00b9851b8206adc2ded2d4c7151", 0x26}, {&(0x7f0000000bc0)="fc3223245c41e3f1c60df81e6986867f1e471b9b0f3ef905fd88f072e9a9ce3c5f49feebee149cbbcefa5e7f4f9ea56e58358d8bfa5dd7ef60aa36f2d3033f15cba71c0617a47108f904ec679c89fa39cd42f79d0fb1deb388595509fd730be238df2c2cdf2b1d3623470bad3d7a962ace2579c33ecab21a2cb2c1bfcd2b8dac02d1943e15a576d86e881365722b05", 0x8f}, {&(0x7f0000000c80)="bb2a874ff8be462c31a9fc5684536f6a741b7e1ea525bccb6eb96bc83e90fe1353fea513ce880ffca6ae9ec548b79407f99701a598ee3f16edc9635dee459415db499d6ab2082a470d54260ae9461f326131a96adb64c360a61b1eedbc36f2ece180b6c85f2af69897a72ad3a15aea134993c22f3d8348768860c296aa90f724541142b94465c945", 0x88}], 0x4}}, {{&(0x7f0000000d80)=@l2={0x1f, 0x4, @none, 0x2}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000000e00)="98b2c3f1eddd3658c7865327f0585753b42a65f267da3c080e99b846b9936910991e28bf597d59b36a53c5f034e58ecbe384a69bc16316433cae893041aad7e61a3e6d2d7dfc7faa61c9336ab8b11ae7e1842aa73b2845ea1c51d06edc418d5bd926473900da96fc21b65f67285c8283390e9dc8fb7303dab249d1c7306fdfaba6419f5058e593af926c50b072e0bacc33a686d1", 0x94}, {&(0x7f0000000ec0)="665a8ea1d5625c8e89c5099356f41b84f686c9b0622e3472678beea77480f493785a9372ee3fa09fa20d9a087f93c45aa658784b19c73d369b5c895156b6324130b6a907e003e610a5610acbc36601fbec2d4e5c495fe22b682592106ce07429671c387765bf89d69444cada695536facd9c3e93084932ead219b9222426bc83aa4e803e19381a6d865d408185b8eafb4c6f6b236cf1", 0x96}, {&(0x7f0000000f80)="046f37336701d4209ccbe7a865119791e888dba72c239272892fddedc8f92d837be96888bd305edffe9c88e2f79b9a7e482a7667168c", 0x36}, {&(0x7f0000000fc0)="3e541ad9a4d19cdd9a837480f3687c8533d5a5ce7570b85b43cf4143fc1420ff", 0x20}, {&(0x7f0000001000)="d1a4e439ad888d83bc3f820164d5be9398a4d59fe59dda865bb638962d6be977e9ddca219e538aa2980fd401787aa75f6d1b2eb1c4c6a5d1b0e7d174d4e80a66f4cc3c20d611780587487bad2776e82357469d11ed5a167b401e595740d45f298e8f0dc23a847d12338b15e6ba85572c53b40b8151f7c96e386b8f93940c11d0244438fb254cfce525498952ed67ddb7579017e244c377d9f03ce938bcfdb0175a566255967ac2b203b505df67cd2806a0cdeafeef830000e10072a6645afcd51c6ed833288aaac1c36a3b17d3aca292ca928dc6363edb5666f488256651c4793b", 0xe1}], 0x6, &(0x7f0000001180)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x60}}, {{&(0x7f0000001200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x4, 0x2, 0x4, 0x1, {0xa, 0x4e21, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}, 0x96}}}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001280)="f6b8d7e1cfbcef9f68bf618e", 0xc}, {&(0x7f0000001380)="c183bea5b03bd6d378e2627561d1eb1bf70e1978265a041112d1b8732bbe2fd785b3e5e2aac1861c18d3cbcdda722eb7829bb06ae78561c51c976ff96c4a63cce3e92606fa5170c3e745962dcb90a97ff0e1ca3880a5f58d2c736b96192e0b326d9fe1c4ddb4fe6afcc45f613e29b3ffa1332dc31688e8cb35109100efe1740b678fdfdcc0bc5ff2021cfe02f400f8bd37d75666b4ebc4b564a68059630113e99fd6a6a46bfd94a9d54d8f2a33d4c93d9f051da4", 0xb4}, {&(0x7f00000012c0)="3579badaf239c1dfc6f9439eb7f2891b22ee2adb19a90ab438ccc97fac762b09b92c06e8e0a3733ade1be880547a3711df31d5e29a785aa352", 0x39}, {&(0x7f0000001440)="3c19b26a8a14163ecc590d7ee5ac912a8d7daf452ca8faab8fa3d29e58d4c1b68c8781dfba0c256aeff81e116e1d5ce3d70cbeffdab0f86e93fa8775686db31fcf59949f503eb6265670738102b9fa1657ca54a19077e15d15ca1c313440b8d2316cee1dade3bd560e3353d8242d1858b35cd7ec929f1acd8212594c6489ae7440ed6b430c2d3648dd7471b4c8e55bb884f069", 0x93}], 0x4, &(0x7f0000001500)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff9}}, @timestamping={{0x14, 0x1, 0x25, 0x8001}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x8d}}, @timestamping={{0x14, 0x1, 0x25, 0x101}}], 0xa8}}], 0x3, 0x4000) chdir(&(0x7f0000000900)='./file1\x00') mkdirat(r0, &(0x7f0000000940)='./file0\x00', 0x0) 07:40:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1571.883308] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1571.888836] EXT4-fs (loop0): get root inode failed [ 1571.890123] EXT4-fs (loop0): mount failed 07:40:52 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:40:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:40:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1584.492114] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:41:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:12 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:41:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x20000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:41:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./mnt\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x81) 07:41:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:12 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:41:12 executing program 1: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:41:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1591.800556] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1591.836716] EXT4-fs (loop0): get root inode failed [ 1591.837522] EXT4-fs (loop0): mount failed 07:41:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:12 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0xe1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) pread64(r0, &(0x7f0000000340)=""/4096, 0x1000, 0x8000) open(&(0x7f00000000c0)='./file0\x00', 0x103040, 0x0) 07:41:12 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:41:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_cancel(0x0, 0xfffffffffffffffe, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) 07:41:12 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x13, 0x0, 0xfffe, 0x5000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xee, 0x1, 0xff, 0x6, 0x7, 0x3}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x13, 0x0, 0x0, 0x5000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@private1, 0x10000, 0x0, 0xff, 0x1}, 0x20) 07:41:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:41:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:12 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1592.139116] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1592.141706] EXT4-fs (loop0): get root inode failed [ 1592.142347] EXT4-fs (loop0): mount failed [ 1606.641136] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:41:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:35 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x20100000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:41:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:35 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:41:35 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:35 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:41:35 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000280)) r3 = msgget$private(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000200)={{0x3, r4, 0xee00, 0x0, 0xee00, 0x44, 0x1}, 0x0, 0x0, 0x2, 0x3000000, 0x401, 0x4, 0x207, 0x0, 0x4, 0x20, 0x0, r5}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x3) msgsnd(r3, &(0x7f0000000700)={0x2, "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"}, 0x3f9, 0x0) msgsnd(r2, &(0x7f00000002c0)={0x3, "e43d2980b54fb20524626ee9a90a667f6621de91ad38a7cd56b83c6d1d9f5a4888547917"}, 0x2c, 0x800) msgsnd(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="01"], 0x8, 0x0) msgrcv(r3, 0x0, 0x14, 0x0, 0x3400) 07:41:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, 0x0) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:36 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:41:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:41:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000002dc0)=ANY=[@ANYBLOB="4c00000010000100000000000000000000000000030000000800"/56, @ANYRES32=0x0, @ANYBLOB="f2d91e1945f7766cc93894"], 0x4c}}, 0x0) r1 = socket$inet(0x2, 0x3, 0xff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000100)={@loopback, 0x0}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa8, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40000}, 0x0) [ 1615.531976] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1615.539750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10033 comm=syz-executor.4 07:41:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000280)) r3 = msgget$private(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000200)={{0x3, r4, 0xee00, 0x0, 0xee00, 0x44, 0x1}, 0x0, 0x0, 0x2, 0x3000000, 0x401, 0x4, 0x207, 0x0, 0x4, 0x20, 0x0, r5}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x3) msgsnd(r3, &(0x7f0000000700)={0x2, "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"}, 0x3f9, 0x0) msgsnd(r2, &(0x7f00000002c0)={0x3, "e43d2980b54fb20524626ee9a90a667f6621de91ad38a7cd56b83c6d1d9f5a4888547917"}, 0x2c, 0x800) msgsnd(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="01"], 0x8, 0x0) msgrcv(r3, 0x0, 0x14, 0x0, 0x3400) [ 1615.545038] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1615.555486] syz-executor.4 (10033) used greatest stack depth: 23528 bytes left 07:41:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:36 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1615.667699] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1628.603829] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:41:57 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, 0x0) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8cffffff, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:41:57 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:41:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000280)) r3 = msgget$private(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000200)={{0x3, r4, 0xee00, 0x0, 0xee00, 0x44, 0x1}, 0x0, 0x0, 0x2, 0x3000000, 0x401, 0x4, 0x207, 0x0, 0x4, 0x20, 0x0, r5}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x3) msgsnd(r3, &(0x7f0000000700)={0x2, "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"}, 0x3f9, 0x0) msgsnd(r2, &(0x7f00000002c0)={0x3, "e43d2980b54fb20524626ee9a90a667f6621de91ad38a7cd56b83c6d1d9f5a4888547917"}, 0x2c, 0x800) msgsnd(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="01"], 0x8, 0x0) msgrcv(r3, 0x0, 0x14, 0x0, 0x3400) 07:41:57 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1636.854216] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:41:57 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xc0ed0000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:41:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000280)) r3 = msgget$private(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000200)={{0x3, r4, 0xee00, 0x0, 0xee00, 0x44, 0x1}, 0x0, 0x0, 0x2, 0x3000000, 0x401, 0x4, 0x207, 0x0, 0x4, 0x20, 0x0, r5}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x3) msgsnd(r3, &(0x7f0000000700)={0x2, "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"}, 0x3f9, 0x0) msgsnd(r2, &(0x7f00000002c0)={0x3, "e43d2980b54fb20524626ee9a90a667f6621de91ad38a7cd56b83c6d1d9f5a4888547917"}, 0x2c, 0x800) msgsnd(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="01"], 0x8, 0x0) msgrcv(r3, 0x0, 0x14, 0x0, 0x3400) 07:41:57 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x3, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x2}, 0x2200, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f0000000100)=0x5, 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 07:41:57 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:41:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, 0x0) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:41:57 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1637.147672] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1637.172204] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:41:57 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 4: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000002, 0x80071, 0xffffffffffffffff, 0x8000000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(r0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) r2 = dup(r1) r3 = dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000000000140004000000000000000000"], 0x50}}, 0x0) r4 = socket$inet(0x2, 0x3, 0xff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) sendmmsg$inet6(r3, &(0x7f00000035c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x9, @rand_addr=' \x01\x00', 0xb14}, 0x1c, &(0x7f0000001400)=[{&(0x7f0000000040)="9e6c3396a3d2e6f192dc8bac6d71c4adfb29f017f5213347f5f7a778faaeeb6347a774db4e09321db0303932cc6ebef3a1dc2775ea730673861adbe921b6ba3026bed77eee85b6d07447d4f54fc0e18b1b3a4378181103cde45d3ca22f9518e9e176457e42b7f7756072cf65df626ed0320d9b45592a05ededf8a01a4e7e086ec19670d72dc790a8673c91635590ef5efc735db8855c9b69de87d63264e3c7fbb17640d9cf50d539369d80b42129b8d2c3ca2dec2060340a78a20920f5fd2d7632082dd30acd9810338974f82e777095be6339672a", 0xd5}, {&(0x7f0000000140)="6190b421d87acccda126b708f1b60b5c713653a6465d49fb9b7dd21ea7522e4cab6ddf0f2910753ddfd746f92ac8ca4fa08a2aa52fa2c06b78b030162c42e5f13880d6a1c1eff2fc4ee0b1b44f4c8d385742d57a60bcd80f331d63343685608f24cb784636ab654a6ba8a346df8394fd7bd4afea07844e782a378482808874132719dbc1c7717e75eb519ef8f156eba527d01ae8240e7c4e60844859bd480b4e32dbb221b6dd1de4bd9c62e876958ad711aa0cb4b95c0e0a4b3028e0f754520d4d373128", 0xc4}, {&(0x7f0000000240)="7549fe35d03617309e4981aa6b284c2df01f7d3085251214733268431cde06a89337d079197d7773fe83789fa9d203dd190fd4301afb8b1c658992e099a460949552d4f2aa3ac351c3f8105eb5c940b8878a53f71f707b0889afafbd6e2cb35490fe0c550285a50c1ae3999766018c87f55d05e26050c08a99ebad75abac6172fe360330", 0x84}, {&(0x7f0000000300)="2efe77d8e836b0592f41f0378dd4cf2c324abf6c673df6ccfdb19e622ff3c264e163de66cca7f5f3c5e5556a2e70252331729cb75bd89c715aece55dcd2754677906f0b2c649328b1f7a9edc69941a259ee09cce4814961071c3f5d5609662ef66bc7f6b0e7f8f74d0bfc0e4124c5c7c0810f1ed932d6a748c35c923ae1666ae24c755212c81e85ea3a0b08d764de13ae415fc8623d90041350f6665fc733c1c8775e601ce227f4cd6daa0d315d244826560f62492ed28db719eb07fab5de18c3384a11af6362993bf9008b08d7706d62d2f4bce42c298913b69fecb2dc66f46b43f262f", 0xe4}, {&(0x7f0000000400)="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", 0x1000}], 0x5, &(0x7f0000001480)=[@dstopts={{0xa8, 0x29, 0x37, {0x5a, 0x11, '\x00', [@calipso={0x7, 0x38, {0x3, 0xc, 0x7f, 0xffff, [0x20, 0x4000000000000000, 0xfff, 0x0, 0x6, 0x5]}}, @ra={0x5, 0x2, 0xb5b}, @padn={0x1, 0x1, [0x0]}, @pad1, @calipso={0x7, 0x48, {0x1, 0x10, 0x2, 0x3ff, [0x2, 0x0, 0x1a40, 0x2, 0x6, 0xd0e, 0x7, 0x5]}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @dontfrag={{0x14, 0x29, 0x3e, 0x400}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x2, 0x2, '\x00', [@ra={0x5, 0x2, 0x4}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0xfff}, @jumbo={0xc2, 0x4, 0x3}]}}}], 0x120}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000015c0)}], 0x1, &(0x7f0000001640)=[@dontfrag={{0x14, 0x29, 0x3e, 0x4c}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001680)="cc597f101b6d11543e68994db7345114529463c89e8945f16a7cdd55b485157b5878aa45ab281a43eafbf1fecd3bffe9986787ede67dbcf5b67f0edf1fa63770213f5296a97f", 0x46}, {&(0x7f0000001700)="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", 0xfb}, {&(0x7f0000001800)="2e779e11be45aef49ff7a36ceccbcbdcbd8bea7fe97a08ef05e5d9e03d3f506f420275143d2449f9c97ba3daecd35f61570f43ca23156ff31a882869e245ffc39a2a7626d9e14808e92178f719e24347fe6c26aca352debc32258776974a37473a16c021559250dfc61b977519107ccfddf41cd920b1d8b7088d9306214ec2785863ffbb95625d219c614c9491157c3a7a7254eb13cf595a483cb0522572acbc6e3bb5954aa70b5d635c92b5d784c5fbc0dc37eca24adf346896779157a61423b4cc5af598c1933019ee7927767ced4e2f7161d4f12b75491ed701b6c80493", 0xdf}, {&(0x7f0000001900)="ca41fc1aed9b95586037e836acd6d4a3bdf98f44490520da3939ef5763bf2510b3e3a54fca6b210a0449ffd6f08f816baf44f5cd08f5c1f876b4885add201a262538371ecc1d429a48a27fc78542d9bedfcbc9c239c5514125e88615eea24b520041975e15588c8210154f5f02f5791a3956467f19b92a28740ea09938b5422f33a69a53fd7dffe5d8771c7f42018dd9fe7248d9317eb10cd44ac788077fdf7497e9c521d29b2918b9f6c184727ba57e0e47f7c1e311e73faf536fbb9d7c679c84edd8b57646335a656ba6b23065582a2f6d79553200edddb693e2d66fe7d5be40fb670a08169212952f1ad35fc5a4ad", 0xf0}, {&(0x7f0000001a00)="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", 0xfb}], 0x5}}, {{&(0x7f0000001b80)={0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1}, 0x1c, &(0x7f0000001c40)=[{&(0x7f0000001bc0)="a350bc5c422490bbef6a0b0cf7d4ef70fc4008dbab610607327e6d1be612e9466163f13e2a446b", 0x27}, {&(0x7f0000001c00)="f393332947b54036433ee3192326ea8ba99979502fda9297d7dfa9adbf6cf3db5f62cd884942575924accec7736c549840901814", 0x34}], 0x2}}, {{&(0x7f0000001c80)={0xa, 0xfd91, 0xffffffe1, @mcast1, 0x401}, 0x1c, &(0x7f0000001e00)=[{&(0x7f0000001cc0)="c5a4ea35b127821dbbb78b901c6666e53cedc0859dab7b45dd3cafc843e3cdb7", 0x20}, {&(0x7f0000001d00)="233c203d6ed60cca34b08e64d519148da16e3368d1fb3eb6c027df73eb6842f9f4f6a86dd7626e6845cb1b34e37b3e34718d4432ec7cf7df86447a8b945e3048e705f0cf1b58abde84c173db5d827fdbeb2a5d1dda3af0", 0x57}], 0x2, &(0x7f0000001e40)=[@flowinfo={{0x14, 0x29, 0xb, 0x7fff}}, @dstopts={{0x58, 0x29, 0x37, {0x9a, 0x7, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @multicast2}}]}}}, @hopopts={{0x10a0, 0x29, 0x36, {0x6c, 0x210, '\x00', [@ra={0x5, 0x2, 0x8}, @generic={0x38, 0x8, "5259d8d788143bad"}, @calipso={0x7, 0x20, {0x3, 0x6, 0x0, 0xfff, [0xffffffffffffb860, 0xbf, 0x0]}}, @calipso={0x7, 0x18, {0x1, 0x4, 0x20, 0x7fff, [0x168, 0xfffffffffffeffff]}}, @enc_lim={0x4, 0x1, 0x40}, @generic={0xff, 0x1000, "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"}, @pad1, @calipso={0x7, 0x30, {0x0, 0xa, 0x6, 0x5, [0x0, 0x0, 0x800, 0x8001, 0x1]}}]}}}, @hopopts={{0x1a0, 0x29, 0x36, {0x5e, 0x30, '\x00', [@enc_lim={0x4, 0x1, 0x3b}, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x5, 0xac, "c07da0c965f51e333369d5d6db909d3bc97968adf92eb26488977aa2f4d454d175635bf10f1129d64f8a495d31329152323be1a256d37270244182b4f9d05b3b5361a72149f6d9a8fcb6fe821d555fa8e7d27c13ed85445351ae31ed2221f0e5371fffc4c8ea406890a124f404ba7e9eb626cf9abfc9b25bd5e0eb8d5b2b09d5f5ed654f85f33bb77ae0b6ca708ef7e364a09d1441073c4d8c30a396fefa205bc9a71333d3d324e970f9e26e"}, @enc_lim, @pad1, @generic={0x73, 0xc8, "80f7acd1aae082fc697d27d046d5cbb7cba1b93d4801a36329191b95e8354e265df44a0f5612e8eb5b8777f37b94192b6b25575e5a08e11f1a43b00208d1c0c3a3f668cce8fc1e2fce52d1a70e4952b206f01663ffda7edac032e562a068650c6503064aea037b0c4d9b54488bd86a16ae74962cc5cc2254a042144ad740e307413dd5d6ff22a26654940f9ca82d4d33597c05a9142de8ed428fc3354e653646a96da34b46952f567fb058c6d6e6fc87b9a68cc637a55739feac5456327fb55f45bf371fc9e8b5b3"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r6}}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @dstopts={{0x50, 0x29, 0x37, {0x87, 0x6, '\x00', [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x20, {0x0, 0x6, 0x2, 0xffff, [0x8, 0x3ff, 0x6]}}, @pad1, @pad1, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}, @hopopts={{0x108, 0x29, 0x36, {0x2b, 0x1d, '\x00', [@ra={0x5, 0x2, 0xff80}, @enc_lim={0x4, 0x1, 0x7}, @jumbo={0xc2, 0x4, 0x7}, @generic={0x0, 0xdb, "28955294faaa6efd5cb3b3d3ba9a238d17835608c961326a6a178a969efcb917ef09271eb0826e2473bbe4d9fd6dbe7931bae6b9ce8002cb8e83405406f17cd4387ca7da33ed5ae1a1ce96852496925363bff0b6bcd9dfb219680e0ec335b95f54e66ebfda31eb1448c1c4553ecb63605274fb3cf7cba69bbc0b4e0bbba6bfebec3bcdc4eca8405d3d2f3e109fb35db5836fe56c43c0985ee11d029215de55f8220b0229a6a7dfbbd7f9b3a7b7cbb5457a1ae520b693d599a8d45a6cbb10fffd249002d3146a1a05671631e93fab6a7455534570b06c28cdd0d251"}]}}}], 0x1460}}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f00000032c0)="1de991a2876c5ec0eb8826b6752a5a62542d9c3db48074f87a909cf319b8f06b9e8531bc93bbd7f687da4e0f6d8a0607605ff5acb12cad24ac8be470e200e04efdcb24c8d716916acfa580ff89d63bf44f4339e8474b6eee9cb16e1c", 0x5c}, {&(0x7f0000003340)="72681fae1a708c254bac25b020421b62b2e5a25fffab8e0cd418e41b2497787244b7f32d9e124963f3ea7daf6fea37258c6cc4bf78e2130e2b25ee24b86840461a45ae12692aa349cae61cd7d8893881785f6fec1067762ec824b0e0021f6854093c1a45b98ab98ad25f7abd4d820f4370735f3f2b7d8571d6ba69185ab073f1a3483ca5863c42cf3a657c59", 0x8c}], 0x2, &(0x7f0000003440)=[@dstopts_2292={{0x80, 0x29, 0x4, {0x6c, 0xc, '\x00', [@pad1, @calipso={0x7, 0x28, {0x2, 0x8, 0x7f, 0xff, [0x200, 0x3, 0x8, 0x7]}}, @generic={0x81, 0x1d, "e20c812ad4407708389654fbf64bece151bef82e319915a41cadcd98cb"}, @jumbo={0xc2, 0x4, 0x4}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1, @jumbo={0xc2, 0x4, 0x7}]}}}, @hopopts={{0x38, 0x29, 0x36, {0x5e, 0x3, '\x00', [@calipso={0x7, 0x18, {0x2, 0x4, 0xf9, 0x2ba1, [0x100000000, 0x80000001]}}]}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x2b743f9e7c641bcc, 0x0, '\x00', [@pad1]}}}, @hopopts={{0x80, 0x29, 0x36, {0x0, 0xc, '\x00', [@pad1, @calipso={0x7, 0x20, {0x0, 0x6, 0x1, 0x3, [0x1, 0x1, 0x0]}}, @calipso={0x7, 0x20, {0x3, 0x6, 0x7f, 0x0, [0x1f0, 0x3, 0x6]}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x81}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x4}]}}}], 0x158}}], 0x6, 0x20000001) writev(r3, &(0x7f0000003940)=[{&(0x7f0000003740)="659e8534712dd7feda88713800f74a2cb8c20c1228273d4604bb8c47a288454f8ac0b97bc20f8d0586fbe0a1dc8a8bb682999d334b420ee01b0c231d03ca4f29e7f9236fb1b8a629ff2eac33183894788bf81f004c6bc3604463835550862223ec119caafa7fdcbafd9c8946f4252a57186b994a98c493a30932aee52b34cbbc951b39252b452b7be1346cdc36b339d5d42592bdf7751c1857780b76a56b4425a456fa274d361bcc964b6d5b80b628738dc1be8894a562e78321ff80a58264f67672ed74bd8d", 0xc6}, {&(0x7f00000015c0)="7b7e1bb5db0354d920af19ec1f9141def2bb5b65e4b610579f7f394e68771e2fe17ace", 0x23}, {&(0x7f0000003840)="b683072891e968", 0x7}, {&(0x7f0000003880)="7090de282b2c6ed0ee9dab1b8325bdf221bfc71024052b0b13b1ee5e1576a2e5f66049c13978c28b27ae1d7a9f55056bb49b8f660add4f8ca50672067c995f6500b82d23ebcdfb2ae2d9c8b0d0b4e59a84247ece77bcf272239faaacf387e08f7c88e49258b488c1b17906e0554040dbeb51aee51da1fc6f241413d91ee7d508899abdd8899cc1cba50ffb9da0e6ec1f6f6ac3efdb01e0bf4e391c32ac7000bc593da5738aae2f21c006e47cf0a34db26d1d2723730410519ee4513637", 0xbd}], 0x4) [ 1637.234021] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:41:57 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:41:57 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:41:57 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1637.309188] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1637.348225] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1637.361676] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1637.444158] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1650.624447] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:42:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x3, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x2}, 0x2200, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f0000000100)=0x5, 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 07:42:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf6ffffff, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:42:20 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x0, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:42:20 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0/file0\x00'}) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x13, 0x32, 0xa, 0x8, 0x9, 0x7, 0x6, 0x140, 0x57c371147aca7cca}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffff0ef, 0x11}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x1, 0x15b}) dup2(0xffffffffffffffff, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ff3000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) ftruncate(0xffffffffffffffff, 0x1) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 07:42:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:42:20 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:42:20 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:42:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}, {&(0x7f0000000400)="173716518af8cc25fe3cdcc4264285f91df2dd4d312236204bf6", 0x1a}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1659.700931] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1659.707937] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:42:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:42:20 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x0, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:42:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:42:20 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1659.911090] EXT4-fs error (device loop4): ext4_orphan_get:1413: comm syz-executor.4: bad orphan inode 301979167 [ 1659.920846] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1659.935692] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1674.077246] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1681.419229] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:42:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x3, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x2}, 0x2200, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f0000000100)=0x5, 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 07:42:42 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:42:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:42:42 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:42:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xff000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:42:42 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100"/140], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:42:42 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x0, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:42:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4200a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40a, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="3e3fc2db0956", 0x6}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000002a00274e002e9ff65f44c3c50008000000000000000000040000000900008099"], 0x24}}, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/29, 0x1d}, {&(0x7f0000000040)=""/193, 0xc1}], 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x2000, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f00000000c0)) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f00000002c0)="1a517e3fbbbd383f6cd96618b10cb898f67dcfe8e3ee45f24eaa493c2a06020bb8a4cca84e919863c1492351543a19fcbe6436fc447924532a4a14c20d63d7d4d612f96164342b471255f39676b54d") dup2(r3, r2) ftruncate(0xffffffffffffffff, 0x1000003) ftruncate(r2, 0x3) acct(0x0) unshare(0x48020200) 07:42:42 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100"/140], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1681.472722] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:42:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:42:42 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:42:42 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x0) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:42:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xffff0000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1681.542273] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:42:42 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1681.677603] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1694.918516] kmemleak: 44 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:43:02 executing program 4: socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000040)={0xffffffff}) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x800, 0x200, 0xfff, 0x3f, 0xe1b}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 07:43:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x0, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000680)='./file0/file0\x00', 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) openat(r0, &(0x7f0000000040)='./file0\x00', 0x2800, 0x81) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 07:43:02 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}, {&(0x7f00000003c0)="fa2bf8baab2d8344c02829397eac198e65b465a94118d64b350a336515d107a12c8f7d7f814a03e793b9e62a3a62f3e4ba8a9a5d18990d22", 0x38, 0x7}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:43:02 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100"/140], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:02 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100"/140], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:02 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xffffff8c, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:43:02 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x0) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1701.916918] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1701.927876] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1701.968047] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) 07:43:02 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100"/140], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1701.990661] EXT4-fs (loop0): get root inode failed [ 1701.991830] EXT4-fs (loop0): mount failed 07:43:02 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) write$bt_hci(r1, &(0x7f0000000040)=ANY=[], 0x6) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696c653100ccdf5f4653916906ff0f613b05ca5f1d5573cfe7f7a998ccce3685fdfc84dbd883931f7ad16729849ae3252c3608826b83128baea93564efa42fb581d167b3d8ae68a55e7ff378b5ef51f7726c2c6e5c576c1a556f08a1968f61bd2c7d057ebc88ec2d30dd227595a76a3076d6ea6b66ec7c92b16a6423bb8238aeedf6c08b7d806f6b6678881e65eef436dd00d91ec188865f9eba0e786af25a76bcc77e680d93808da0fb055abd34"]) bind$bt_hci(r3, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) openat(0xffffffffffffffff, &(0x7f0000001180)='./file1\x00', 0x0, 0x138) r4 = syz_open_dev$mouse(0x0, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, 0x0) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x480500, 0x0) 07:43:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1702.009689] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:43:02 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:02 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100"/140], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:02 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x0) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:43:02 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xfffffff6, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:43:02 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1702.162669] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:43:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:02 executing program 1: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x5629, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x43ad}) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'bond0\x00', {0x2, 0x0, @empty}}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'dummy0\x00'}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000040)={0x88, 0x0, 0x9, 0x4}) dup3(r1, r0, 0x0) 07:43:02 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x2, &(0x7f0000000280)=[{&(0x7f0000000440)="83fca3a8bc0b9dd983484dc9544b269033785a07d0029134009a6edff4f5bba6f865577777d29cb23d90c5269607a9e4633b19b544dc7463c862658e46570c6ffb252349b3593f602101b9c9ab1eaa1e3b715f93b8d056320790502b6ea7eaea1f3122d5c28f62bd349443ea58ed924d701488154d280a15dd0fe80ce8ce9d3d354a8f1f57bfe1f603ae790649baab93b712176a77893e190179882a41581c9269ac01312cb02179d5ab7371e15f6529988a8ef5", 0xb4, 0x339}, {&(0x7f0000000500)="90c9c50e5a1745eb012d0883d4591d8194ad13e066392eb21f2d62b3ff09930afa538744c49d75d17ada530d8e054aaf032d2dc5f37859d60003015278f489fce0402974b3aa19ff71fe45aa88cc93b10050a17abc2e253d7a083ffcd16c2f42405c6d345178c95888f0d2baa8e649e74f3163c0e4bf850b52295238961fe4cb66b665dd0ea2467204e6ffe7f937b32af325245defdf3c43a05ca7e74a4b4b6ea9d3e7aadea0dbca7f9d66cd888681dea30bc87255c9266009e61f8356758143ef6831f9115233bc5af6c61efec14d8a6edb3f0112ad3c873f63a7aa3569ec680cbfcce99d48cb", 0xe7, 0xf10}], 0x800000, &(0x7f0000000680)={[{@grpid}, {@oldalloc}, {@user_xattr}, {@resgid={'resgid', 0x3d, r2}}, {@noacl}, {@nodelalloc}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0xd, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) r3 = getpid() pidfd_open(r3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780), 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000007c0)={0x9, 0xfffffc01, 0x0, 0x9, 0x7}) perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x9, 0x80, 0x8, 0x3, 0x0, 0x4dd, 0x10000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x216, 0x9c50}, 0x200, 0x7, 0x8, 0x5, 0x6, 0x4e10, 0x9, 0x0, 0x6, 0x0, 0x100000000}, r3, 0x1, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000001c0)={0x0, 0xfffffffffffffffb, 0x92, 0x0, @scatter={0x5, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/39, 0x27}, {&(0x7f0000000840)=""/64, 0x40}, {&(0x7f0000000880)=""/111, 0x6f}, {&(0x7f0000000900)=""/31, 0x1f}, {&(0x7f0000000940)=""/93, 0x5d}]}, &(0x7f0000000380)="414711ae4633c5f7365670fb21dd5324a7519e7a83614fc13197eb02d6e489fcc91e6f31ecb040eed840a1a03e01ccc81d1c2f8081b1b686f0e61f511339328a3060d3c3cd8aa912a9343feba612d68fe5f521bf88cd9fe01175c9828a3f4df3efd0a43c25f1800dae54a0c6efa159da9ff42ddc64f8910efe855603b78803340b91de1aa85c15d8972f187a0dbffe9d8663", &(0x7f00000000c0)=""/109, 0x7, 0x10001, 0x2, &(0x7f0000000040)}) ftruncate(r0, 0x8755) [ 1702.296822] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1702.348018] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1716.093037] kmemleak: 33 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:43:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:24 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43cdf4bb81655e05bf7d1278c1c0002000000375c7563d947e6667751bea390d4e1ca67cec69334f530b486acafd4b18b0e", 0xc1, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:43:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) link(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='./file2\x00') unlink(&(0x7f0000000140)='./file0\x00') r1 = open_tree(r0, &(0x7f0000000000)='./file1\x00', 0x100) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'netpci0\x00', 0x1}, 0x18) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) connect(r3, &(0x7f0000000340)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}}, 0x80) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xff}}, './file3\x00'}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100003c0d148ca5", @ANYRES32=r0, @ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00./file3\x00']) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file2\x00') 07:43:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) r2 = dup(r1) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000000000140004000000000000000000"], 0x50}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x8000}}, './file0\x00'}) dup(r4) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000080)='\xd7}\'\x00', 0x0, r3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000000def361b116dd4bb681391964ccf077da010040", 0x1f, 0x4e0}, {&(0x7f0000000100)="8081000000180000d0f4655fd0f4f91bce7fdfed", 0x14, 0x540}], 0x0, &(0x7f0000000040)) 07:43:24 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:43:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xedc000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:43:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0x0, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:24 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1723.779660] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. 07:43:24 executing program 1: faccessat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000800)={0x58, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_IE={0x2c, 0x2a, [@preq={0x82, 0x20, @ext={{}, 0x0, 0x0, 0x0, @device_a, 0x0, @broadcast}}, @chsw_timing={0x68, 0x4}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0x4}]]}, 0x58}}, 0x0) 07:43:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:24 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1723.823471] EXT4-fs (loop4): filesystem too large to mount safely on this system 07:43:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1723.851132] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. 07:43:24 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000000c0)={0x1, 0x10000, 0x7, 0x9, 0x1}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1724.009899] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) 07:43:24 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1724.041971] EXT4-fs (loop0): get root inode failed [ 1724.043709] EXT4-fs (loop0): mount failed [ 1737.349828] kmemleak: 48 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:43:47 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200100004000000097"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) io_submit(0x0, 0x2, &(0x7f00000001c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x7ff, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 07:43:47 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:43:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="07af43ba2470", @random="a62475dec4db", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "96153f", 0x8, 0x3a, 0x0, @local, @local, {[], @echo_request}}}}}, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x0, 0x6005}, @val={0x1, 0x80, 0x467, 0x1000, 0x5329, 0x8000}, @mpls={[{0x400}, {0xffff, 0x0, 0x1}], @llc={@llc={0xff, 0x0, '|', "24b8d1ed2fad2dfbef3b368ff42d95fac218f09fb962cd59df009db3e2f0066741ae696bbf276549be385169aba265322a37a7f3d1885834edb6c1e33d1ba939edd1f76da165a0191eaa875e696897e01dcdc631958f2ab7d05f9684a01e9b8d3f23b7eaf8e47d3894065c84ec110740f61adaa2992c9a8a4588a157fcd82257429f173ca6bc5b249b722a73725e103877789119a429dece6748b7a53d59918f9350f9ccdb6e85235c56a2b08987b1c2e7200880f33ee40d02e0c1cde32d541749cb39b8cd1444e263a0ad0c558f3f3fc1ebe4c9b683e9bbf5f507705521dff446d562a5"}}}}, 0xfd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x401}}, './file0\x00'}) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, r3, 0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x428d02, 0x23456}, 0x0) 07:43:47 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:47 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:47 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:43:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:43:47 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:43:47 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200100004000000097"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1746.674087] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1746.686727] EXT4-fs (loop0): get root inode failed [ 1746.688210] EXT4-fs (loop0): mount failed 07:43:47 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:43:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) r3 = dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000000000140004000000000000000000"], 0x50}}, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000000)=0x4, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="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") sendmmsg$inet(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_retopts={{0xbc, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0x87, 0x0, 0x6}, @timestamp_prespec={0x44, 0x2c, 0x98, 0x3, 0x8, [{@multicast1, 0x7}, {@rand_addr=0x64010102, 0x8000}, {@empty, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}, {@dev={0xac, 0x14, 0x14, 0xe}, 0x1}]}, @ssrr={0x89, 0x7, 0x1b, [@loopback]}, @timestamp_prespec={0x44, 0x4c, 0x98, 0x3, 0x6, [{@broadcast, 0x7}, {@private=0xa010102, 0x5}, {@multicast1, 0x1}, {@private=0xa010101, 0x9a}, {@loopback, 0x9}, {@multicast1, 0x3}, {@rand_addr=0x64010101, 0xffffffff}, {@local, 0x800}, {@local, 0x61a}]}, @timestamp_prespec={0x44, 0x24, 0xc6, 0x3, 0x3, [{@local, 0xb5e8}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5c}, {@broadcast, 0x3}, {@broadcast, 0x3}]}, @end, @timestamp={0x44, 0x4, 0xe1, 0x0, 0xe}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}], 0xd8}}], 0x2, 0x0) 07:43:47 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200100004000000097"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1746.726598] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1746.743554] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1759.685896] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:44:07 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200100004000000097"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200100004000000097"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:44:07 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/sync_on_suspend', 0x22902, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) clone3(&(0x7f0000000280)={0x8004080, &(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140), {0xf}, &(0x7f00000001c0)=""/21, 0x15, &(0x7f0000000200)=""/25, &(0x7f0000000240), 0x0, {r0}}, 0x58) sendmsg$nl_generic(r0, &(0x7f0000001400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000013c0)={&(0x7f0000000300)={0x10b8, 0x26, 0x2, 0x70bd29, 0x25dfdbfb, {0xb}, [@nested={0x9b, 0x61, 0x0, 0x1, [@typed={0x8, 0x51, 0x0, 0x0, @pid=r3}, @generic="96e2d053fb6af83b36a598758f84d40d9b3c46c928f1d9fa6125e83b4dc3deae884870db7b127366bf070436652c8fbd9b13ea03494cc7098377a4b18dadf6c52bfc29f788528b4e155122d110c04927c613de333c27ed6aae87cf75a50ebd3f8821bfde99e6d922c4525451854b70702d8c88e7c082af9f84b8e14146587ae7a97e96a1e73a34f74eb5161d0d4cbc"]}, @typed={0x8, 0x57, 0x0, 0x0, @fd=r0}, @generic="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"]}, 0x10b8}, 0x1, 0x0, 0x0, 0x80}, 0x20000881) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) connect$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x2, @none, 0x1, 0x1}, 0xe) 07:44:07 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:44:07 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:44:07 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0x210) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40086607, &(0x7f0000000200)) dup2(r1, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r2, &(0x7f0000001180)='./file1\x00', 0xa581, 0x138) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000001100), &(0x7f0000001140)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x200080) kcmp(0x0, 0xffffffffffffffff, 0x0, r4, r3) r5 = dup2(r0, r3) bind$inet6(r5, &(0x7f00000010c0)={0xa, 0x4e22, 0x4c, @dev={0xfe, 0x80, '\x00', 0x28}, 0x6}, 0x1c) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0xffffffffffffffe6, 0x800) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000100)={0x0, 0x1000}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000200)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0xd0009411, &(0x7f0000001e00)={{0x0, 0x2, 0x8001, 0x0, 0x2, 0x5, 0x1000, 0xffff, 0x7fffffff, 0x4, 0x3, 0x9, 0x7, 0x4, 0x3}}) [ 1767.259143] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1767.281550] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 07:44:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) copy_file_range(r1, &(0x7f00000001c0)=0x6, r1, &(0x7f0000000300)=0xffffffff00000001, 0xacec, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000280)={0x19, 0xa, 0x7, 0x1, 0x4, 0x2, 0x5, 0xc4, 0x1}) write(r1, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r3 = dup(r0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), 0x1, 0x2) r4 = openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x20000, 0x0, 0x10}, 0x18) r5 = getpgrp(0xffffffffffffffff) sendmsg$nl_generic(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c002bbd7000fbdbe6250800000008003b00000000000000", @ANYRES32=r5, @ANYBLOB="714658826139cdacb7a4cc46ab43725320ba7f107c988a9848bc6d60941b8cd1b237dbc743937e992f105a7a3ea834f2a227385a0a8508ec82a2e39c64b5650d44ef0d43b181ca1c3342587fa8bfa51ce6fff34f731e9eb91e58daa1bfdd7a5fc0cdfef2717790cd154117a5e06c8d3c5daa77f24f77272a85"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4044) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r3, 0xf50f, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000380)=""/159, &(0x7f00000002c0)=0x9f) unshare(0x48020200) [ 1767.327007] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1767.332000] EXT4-fs (loop0): get root inode failed [ 1767.333573] EXT4-fs (loop0): mount failed 07:44:08 executing program 4: syz_emit_ethernet(0x56, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x200141, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000200)=0x3) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000380)={'erspan0\x00'}) writev(r1, &(0x7f00000004c0)=[{&(0x7f0000000100)="0b6dee6d2080d7fb65be9f0be263c88112", 0x11}, {&(0x7f00000001c0)='L', 0x1}, {0x0}], 0x3) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'veth0_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f00000000c0)={'erspan0\x00'}) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="0b6dee6d2080d7fb65be9f0be263c88112", 0x11}, {&(0x7f00000001c0)='L', 0x1}, {0x0}], 0x3) write$tun(r0, &(0x7f0000000080)={@val={0x0, 0x88ca}, @void, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0xfffffefb, 0x4, @broadcast, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @mcast2}}, 0x38) 07:44:08 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:08 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:44:08 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:44:08 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200100004000000097"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x100000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1767.598166] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1767.610663] EXT4-fs (loop0): get root inode failed [ 1767.612113] EXT4-fs (loop0): mount failed [ 1781.615707] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:44:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a}], 0x0, &(0x7f0000012900)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x6, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x1, 0x7ff}, {0x7fffffff}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(r2) r4 = dup(r3) sendmsg$IPCTNL_MSG_EXP_GET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[], 0x50}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) faccessat(r4, &(0x7f00000001c0)='./file1\x00', 0xb) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xee01}, {@in6=@private2, 0x0, 0x33}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c}]}, 0x158}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) 07:44:28 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:44:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x200000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:44:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:28 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:28 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:44:28 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0xf63]}, 0x8) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xa, r0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r2) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x1, 0x4, 0x201, 0x0, 0x0, {0xc, 0x0, 0x5}}, 0x14}, 0x1, 0x0, 0x0, 0x60000080}, 0x400c000) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$DVD_AUTH(r3, 0x5390, &(0x7f0000000240)=@lsk={0x2, 0x0, "6fcfe450b4"}) clock_gettime(0x0, &(0x7f0000001d00)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000001f00)=[{{&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000500)=""/107, 0x6b}, {&(0x7f0000000580)=""/114, 0x72}, {&(0x7f0000000600)=""/228, 0xe4}], 0x4, &(0x7f0000000740)=""/239, 0xef}, 0x3}, {{&(0x7f0000000840)=@can, 0x80, &(0x7f0000000a40)=[{&(0x7f00000008c0)=""/100, 0x64}, {&(0x7f0000000940)=""/246, 0xf6}], 0x2, &(0x7f0000000a80)=""/216, 0xd8}, 0x815}, {{&(0x7f0000000b80)=@nl=@proc, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000c00)=""/176, 0xb0}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001e00)=""/215, 0xd7}, 0x3}], 0x3, 0x40002000, &(0x7f0000001d40)={r4, r5+60000000}) sendmsg$IPCTNL_MSG_CT_GET_DYING(r6, &(0x7f0000002080)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002040)={&(0x7f0000002000)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3, 0x0, 0x3}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x24048041) r7 = signalfd4(r1, 0xfffffffffffffffe, 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), 0xffffffffffffffff) sendfile(r8, 0xffffffffffffffff, &(0x7f0000000180), 0x6) sendmsg$TIPC_CMD_SET_NETID(r8, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r9, 0x100, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0x9}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x100208c1}, 0x1) sendmsg$TIPC_CMD_GET_LINKS(r7, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r9, 0x200, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x9}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r10 = open(&(0x7f00000000c0)='./file0\x00', 0x1c0, 0x2) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7f, 0x81, 0x27, 0x20, 0x0, 0x4, 0x43, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb53, 0x0, @perf_config_ext={0xe9, 0x62}, 0x2000, 0x9, 0x10000, 0x2, 0x8, 0x4, 0x400, 0x0, 0x401, 0x0, 0x400}, 0x0, 0xc, r10, 0x7) [ 1787.996506] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 07:44:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:28 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1788.153994] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated 07:44:28 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448ca, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xe0, 0x3, 0x7, 0x7f, 0x0, 0x2, 0x404, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x800, 0x7f, 0x10001, 0x8, 0x401, 0x401, 0x86, 0x0, 0x8000, 0x0, 0x3}, 0xffffffffffffffff, 0x4, r2, 0x2) 07:44:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x700000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1788.193098] EXT4-fs (loop0): get root inode failed [ 1788.194819] EXT4-fs (loop0): mount failed 07:44:28 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r1, r0, 0x0) ioctl$CDROMRESUME(r1, 0x5302) preadv(r0, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/123, 0x7b}], 0x1, 0xffffffff, 0x0) 07:44:29 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:29 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:44:29 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:29 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1788.664544] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1788.676157] EXT4-fs (loop0): get root inode failed [ 1788.677701] EXT4-fs (loop0): mount failed [ 1802.765922] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:44:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x800000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:44:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000002c0)=0x4000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) r2 = dup(r1) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000000000140004000000000000000000"], 0x50}}, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@DEVLINK_ATTR_RATE_TX_SHARE={0xc, 0xa6, 0x49b2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) 07:44:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:44:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:51 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = syz_open_dev$rtc(&(0x7f00000000c0), 0x619c, 0x180) writev(r1, &(0x7f0000001c00)=[{&(0x7f0000000100)="208056d0f8b0ed7d6633971c6b7aee84ef7461dd82c1ecc2c3b7d53bb05061a8a2449cd18170468f857d4646e64694929f29baa0421e003a71abf1917ff130f86d65b595ec4d4640778b4b2da7edac9cef5a7bdfb6e9ac97013c27bf2db4df53cab7b7c6e57b3ecccca10de4f00706b71740db6c64b217e7e9a725a7743c3065a5c4356df6626dfaefcfc09d3eea5aad057931a2cd9d4c7f30a2336dc52c09160fdf914a2838baed44efb6e4ee0b283d707be129cbceec37f7413ca3bafb46dae143d6088fc73172f8162fcc73201bdaf7c3166b5483a64234692c85ee5fa77d4e519a5ea59fd7fb8544d477773a87", 0xef}, {&(0x7f0000000200)="09324c8ae74ac1c8582855062b6880b08fcf80d903cb68911197f717a00dbb20f40eeac7e3e03d0340831bf4046c7580851f872478cca15690605854585711d3ec9ad01314204a2e23eec21141c8fd52d6c830a993a6664f4e1d9f2272a43e44f75b22322a198129c1e545d2a30baae25e344773a38a7bc3", 0x78}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="78036961a70d95428038d556c66dede57a3785e03b2698f9691c749cadbb3e4309bc9d77bd8c3fd3353df61fcb5e275eb91b432674a5afe098f3a985a83a086783b3af69a0e995a957865e494dad1f7f96cbe7b666b6ac8a67e06eb8bd952549d2f06d1551ed54e60b41fb67c8bfa8c9bcbee84798ab275fe1d70f665d450e58c8ea1b59deace0ae", 0x88}, {&(0x7f00000019c0)="e6f20a293c6b7217a59be2d71e6ccedbe1a5983b2673b14cc06df0b1552d494df932ad7957c55514caae1e674c9271d342e2cdeed7c234ff273e6012", 0x3c}, {&(0x7f0000001a00)="61b12e5fc2424482f47f1ecf835407cb72df37132632610bced3b0eaf07548a34fb4f7e184a300fb35bd22358c86228a46cadb0446c71d39f27c00e4594c452fd1d78c325a5990ee90937afe00183132c4c7f8f673ad00566fd8e15bb9f76d4780a1aedc0bb62a2db9c9090b7b", 0x6d}, {&(0x7f0000001a80)="f2028f7f97dd", 0x6}, {&(0x7f0000001ac0)="ca580c27ea6b98ad86d4", 0xa}, {&(0x7f0000001b00)="26fe10b8a279ca92c0d03adfde967da67c368d77a04491441c5ea67b6d17a81bdbf49e59315ddd9a1c5f5b7cf3d24bbfa1d0fd5fe9941f678a7e73979f1c7e82e3961aec1bdd761006f8937c2a2322c7fbaafe8275791be00eeca21081b5c6b19e9dfdb40f522fc94e239d2d0209d1169615147f7a77b54131a133fbc1434d6d4ffa7113a92e5bd76c9481625b4f81a2417c28187795ffe788adede93a9b81e67d6d5008d5ee8168d6fc32ba1f17fde87bf77b18adca238371bb0d07cf8053924ee6bbd3c160faf109ab4d9661c565892f21a1f447edfb4d631afa991fc070cf331d73a117161120e716e5ff54ab35ac39af8cdc6f67", 0xf6}], 0x9) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffd}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46050000f3000000000000000002000300000000006e00000000000000400000000000000081020000000000000000000000003800010000000800000000000000f9ffffff06000000000000000000000000000000060000000000000006080000000000003f000000000000000000000000000000bfc3a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aae6580076922f23df000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000464f00000000000000000000000000000000000000000000000000000000906674a52bde0000deb3da0933f96c85e26868f3bd650e03f52f7278e9a71f3369a2725ca1af202c038bb5cd555c38eacd98cc380569ebd81fb69ceb983db680f11e64b4f08f370e4afaf48322561a22f707c10d39211a4f0b218c9e1a5e1425a01bc5aa02603aa654fff6d84787e56e2091c94708938e4fac5b1d5602f0a58380e175316cdd7e0e7561f6ed2acc26866865afce2a2144"], 0x57b) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x9101) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000080)={'veth0_to_hsr\x00'}) 07:44:51 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000000500)) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:44:51 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:51 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1810.417058] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1810.467931] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 07:44:51 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:44:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x900000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:44:51 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1810.577791] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated 07:44:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1810.613018] EXT4-fs (loop0): get root inode failed [ 1810.614310] EXT4-fs (loop0): mount failed 07:44:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40086607, &(0x7f0000000200)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) openat(r2, &(0x7f0000001180)='./file1\x00', 0xa581, 0x138) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000001100), &(0x7f0000001140)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = dup2(r0, r3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = dup(r5) dup(r6) accept4$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x800) bind$inet6(r4, &(0x7f00000010c0)={0xa, 0x4e22, 0x4c, @dev={0xfe, 0x80, '\x00', 0x28}, 0x6}, 0x1c) openat(r1, &(0x7f0000000140)='./file1\x00', 0x1, 0x20) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0xffffffffffffffe6, 0x800) 07:44:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c4600000000008000000000000003003e000100000000000000000000004000000000000000ae0100000000000000000000000038000100000000000000030000000000000000efffffffffffffff000000000000000000000000000000b9"], 0xa78) close(r0) ioctl$CDROMREADRAW(r0, 0x5314, &(0x7f0000000480)={0x20, 0x7, 0x80, 0xff, 0x1f, 0x8}) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000000)={0x8, 'veth1_to_team\x00', {'batadv0\x00'}, 0x2}) 07:44:51 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000000500)) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1810.788922] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1824.775474] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:45:12 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000000500)) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:45:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:12 executing program 1: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[{&(0x7f0000000500)="dce55b1a23d9f3f344e1a861ab23", 0xe}], 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000700)={0x1b0, 0x1, 0x1, 0x801, 0x0, 0x0, {0xa, 0x0, 0x5}, [@CTA_SEQ_ADJ_ORIG={0x4c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x95}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x400}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x6}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x2d}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xbe0}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0xfffffffb}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x8}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x8}, @CTA_PROTOINFO={0x38, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x34, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x5}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x7}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x7}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x1}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0xffff}]}}, @CTA_LABELS_MASK={0x14, 0x17, [0x6, 0x9, 0x1000, 0x5c9]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_LABELS={0x28, 0x16, 0x1, 0x0, [0x9, 0x0, 0x7f, 0x94, 0xe2, 0x5, 0x1, 0x0, 0x3ff]}, @CTA_TUPLE_REPLY={0x80, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1c}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_MARK_MASK={0x8}, @CTA_SEQ_ADJ_REPLY={0x34, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xfffff001}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x7f}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x6}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xff}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0xffffffff}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x800}, 0x10000000) r2 = dup(r1) r3 = dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000000000140004000000000000000000"], 0x50}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) r4 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r4) r6 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, r6) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r7, 0x0, 0x0) r8 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r6) keyctl$KEYCTL_MOVE(0x1e, r6, r8, r7, 0x0) keyctl$reject(0x13, r7, 0x310, 0x80000001, r5) 07:45:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0), 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:45:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xa00000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:45:12 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="17000000010000002e2f66696c61302f66696c653000"]) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE, 0x0) syz_io_uring_setup(0x495e, &(0x7f00000002c0)={0x0, 0x3750, 0x1, 0x3, 0x229, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000380)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000000040)=0xace, 0x4) syz_io_uring_submit(r2, r1, &(0x7f0000000540)=@IORING_OP_WRITE_FIXED={0x5, 0x5, 0x2004, @fd=r3, 0x200, 0x10000, 0x0, 0x16, 0x0, {0x2}}, 0x891c) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x2004, @fd_index=0x7, 0xf1, 0x4, 0x81, 0x14, 0x1, {0x1}}, 0x7) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = creat(0x0, 0x80) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r5 = openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000180)={0x0, r6, 0x0, 0x401, 0x9, 0x4}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x80000000, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {0x0, 0xffff}, {}, 0x3, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x33}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x5}}, 0xe8) close(r7) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000008ccc9cb64fc9f78bb16ab5a8a1fb9534101339b23f9c412d2ee7abc25c0ff45ccd533997f00bb92e7f094a15874aeeaf762bb7de5b65da2677489e46f6e2d702f39d67e68ea683bf4e62b9b3bd7555d8b853fd1fac23bb1d9858db8f62a0d2f26d53bb70b381cb81357b4cd96f848b26ba8e391bb15ddcad05bbdd415741c306b42b07a1d4850ae64ac61f712a38eb30bb561dd2d5d8564ab59b1abae5a55eba1de1edb2c13c2b592d17d008b71246c252c8af59d757f02d165df01e9bfeeeaeadd6f5b6261709567831b830ddef1f7d0327ccdbb2941614e34b8341000000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) bind$inet6(r8, &(0x7f0000000140)={0xa, 0x4e22, 0xdb4, @remote, 0x8}, 0x1c) 07:45:12 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1831.836063] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1831.851910] Option 'ÙóóDá¨a«' to dns_resolver key: bad/missing value [ 1831.889798] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 07:45:12 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:12 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:12 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:45:12 executing program 1: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "f31a0000434ef9bab774bdcab95c000d00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x15}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1803, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5c912, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() pidfd_open(r3, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x8a, 0x1f, 0x7, 0x27, 0x0, 0x329, 0x2040, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x100, 0x9}, 0x0, 0x7f, 0x8, 0x7, 0x7, 0x6, 0x800, 0x0, 0x7, 0x0, 0x6}, r3, 0x2, r2, 0x2) r4 = socket$inet(0x2, 0xa, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10280, 0x0) dup3(r4, r0, 0x0) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f00000002c0)={0x0, 0x0, "43c073", 0x0, 0xa4}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = dup(r5) dup(r6) connect$inet(r6, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) [ 1832.083731] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated 07:45:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xb00000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1832.100220] EXT4-fs (loop0): get root inode failed [ 1832.101617] EXT4-fs (loop0): mount failed 07:45:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x800000, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f0000000000)='./file2\x00', 0x505040, 0xc) ftruncate(r0, 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x145142, 0x0) sendfile(r1, r0, 0x0, 0x108000001) [ 1842.657145] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:45:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:31 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:45:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1000000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:45:31 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0), 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:45:31 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:31 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000081", 0x5a, 0x400}], 0x0, &(0x7f00000000c0)) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') 07:45:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0xfff, 0x2, 0xd5c}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8010, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x80000000, 0xf1b2) unshare(0x40000400) [ 1850.975859] EXT4-fs (loop4): unsupported inode size: 33024 [ 1850.977167] EXT4-fs (loop4): blocksize: 2048 [ 1851.033945] EXT4-fs (loop4): unsupported inode size: 33024 [ 1851.035234] EXT4-fs (loop4): blocksize: 2048 [ 1851.050186] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1851.064055] EXT4-fs (loop0): get root inode failed [ 1851.065536] EXT4-fs (loop0): mount failed 07:45:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:31 executing program 1: sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa0801020}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x4c, 0xe, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24040815}, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0xed3, 0x8, &(0x7f0000002740)=[{&(0x7f0000000340)="60a3d7d945af30f85c94b99cc9e7310951209b1caca0986932d54b41e1bf5ec005961521897e919613b5f6f31cb46f0fb5ac660c2a851c144c4745cf4127c9119e287e3b141cc16cda30956ad57d5c7dae9efc34c68e25726ebca37864b6042df074ba5d6fd2b3a3826eac655c1a0f77a399a09f275f3a0318ee47bc72625d6d163b55d376f28638d610b1", 0x8b, 0x1}, {&(0x7f0000000400)="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", 0x1000, 0x1}, {&(0x7f0000001400)="311b5f1d40871b14567699f784fe3a2b469c9b4bd4f24da78dc263083dcc0b4bcba66a9013782883ed03107e9b95e371919acc61316f1bb9b3db79020e51b78a28aecd23c6f97b82db2aa253e5a2d34a2b7d0774142a4779bb7bb2b0ae04610cecc983b4a4f4f6b8e63732ef527fb41f834f71dd72d9ac26482a268206fa975c65bec03dab92e7a1cb35bec21343e86b7f06337341133d33d2f32d20", 0x9c, 0x1ff}, {&(0x7f00000014c0)="7f9cc2fa451a41cd4fd96d79c1e5cac692e2c863f0a93e11e2f566c9bfdd897dcb366a67a1f134935cea6392a72aa70721b797f990ae0923fa6dcc5aa7ce19460921e1e7a626fbcf843afdd640b0d09b9b2d3560db5d59901a5f6fb8a8a6f88d8a3f", 0x62, 0x1000}, {&(0x7f0000001540)="b3cdfbd714e616fca88c39ee8ef19f0e183004b1d2f81a43a598b6e96c825ad21423e4668dccc766b8c115d644101d221014726d64d6162bc3ebcf749eff3ba3c9ea96531e6d2f688912924c68d10b024d9a9b91447b70984c53cfab35a35654b04623c5fdcb6b9b112158b284601f7bb0bf3f5d88ee0708b0922cc76a030118f968227d0ffc6f79dcd1764cc06ff71399bfcb17c2b9991ab8362c352a02ef6c66", 0xa1, 0x2}, {&(0x7f0000001600)="84f9f0aecab74d67d9b95d51197cbba7bb96e1a096e2f329a58dbbee6767573df12c5f873729a850068cdd", 0x2b, 0xfffffffffffffffc}, {&(0x7f0000001640)="f6faff6bad57924366d48e760c13bd55d8bc0d05533f2f31431d69921d3bc9769d63354907bf73b6f4a0b0ba6cdc187560b48840605a4be45cecd2b8322e2bce8ddb09b7f907227a3efbb5d22f8f003712398f8a46e81b5d571e874315bd3e39becd4fff17ee916e7274f7cbabe33c1252a2ec9b6cbe2808d6db3a8285de2309164ba2fc519ee8e56f839122fd5aaf5c0c7740ef22fa1ad7373e254e599e22a0f44867d2b1167c2070cda3a7bbe42a953a18228d2ac6c78ce9778b7f4ba47f255cee", 0xc2, 0xbf}, {&(0x7f0000001740)="3354966be7da398b0edb35e953a2d9d1353162b7e9432d7fd6d0b64a97cf2ac5a304d2e219e79a2e3f59e766cb67814e082373b0ef73ca209527563aff1f2e636d34fb79cbbfaeb8ad11658034a6e6705171522dfe2328957b7e1524faf7d6ff32f60de5088880599b13c79cfd34bfd61a210ece4d08bd9eebd20784f2eb7da369b2c2dd35f28749d612a0d53cc1471c97b9d6b5fc0696748c608799ebf8f34cbca4f01a97c9d92cbfb8c09589fcfcb45f3262f25c0769868d4f3abaff1cbdf1362b1117119708eab11582a29ab8679ed4c8951099c88ed2120446de816504068c061bb3f8e4046589e3c688e98547e3cf6ba6b39e333954c556145c1bab57a7f3095d36cc8d2efa9607bd2c33785bb3a280a865161c7e90e0be2259af516d456c4753bb696da34dfb868ff6a81fbd32ce5396fea984ea9c4638c20ae4da63f0c8e4f5eafcafe2c2332fe72252c2d8c87e266a27aef5c29e2413b064650e24329bd66b42dbc9da75fd54387275137491a7ed8def859e6b748341a1838a659b17140c4e6d56853265eff25ee5a01926deacb45e85d330f1f3f62da4e43b1050be29aa762b8eb8149cc7cc8fb8dd09628669f86d66b8fbff22347e2c77892aadb6213c4ad8521090a9e6e79a1e16ebee75236556e0a4eca1c0e3b838fde1966d39cd63c9cd23d2581919fb1fa336a0ec471b49455472c634047d787435fb5e7c128fb3a8b906401fd5c1837f1c33f6e6d92dd12c664d17302b4c35f0a39bb7097eb0fd3004728e5d6eb2dbd9fa90ed77bc9f0b6af3afb1d476ff1203b06675c265eeb37d2b39c2a678c60c004ef35b65e33b6c641a47eb449ce5c4d11a0294cc0c1c14915202e881d17a5afd04063edf5a63fe8d54860949b146b49fd041a0d918957ad0a7d71fccaacd6aa76cea0bb4a33b88bc3de021a5c88d452c5e04cf7d9312a72d294582e89f055caed88b2280a12f7bd8754fb64e901bdcf189b0b309947d77dd75ef38559a35fc1b2aac4901c7d82f0b98e110af7b7cee6c8d09948f5727e6428bd32c3677d2848d74be28b205f3a419c5d3b946e479a0940b9c2aeca9ec0c64dc1e4bf3f4bd3e0dfe31f713dc44f2a504c16fc7ad25fb3e7f39f0e71d043fe83efe5602e141ced88b5b0355de47460ec9cd01616f72f8b95b5f94f303c3babf62d8b4175e59c59bec35ae5992d095661c5f73166bcfdb691bfa4b0358ec98a231a775e5dba4a3f104935e476f8cc579a86e807861909cb3ac5573844ca2b7baf7c22a564438d5aa48efffd3a86b2c79792bc2bb12e390758b464efb7c883072b8edc3e3d9f774687e20dd97fbba7dcfdc1f07200db2b5c013e7af541c779abeb43f292c4be4534f669d2544b0820a6762135aadd8dbd77fa58f476016d3269d611d13759e6edbd30ca62f733b0c856c16bcc41f2da57768c9850fe6dbaf6ad0a77ee8550eb109597215feb156a259731cd71d6e2773e9b59628deae34198fcaf8145119ad95bf19556b27660b825b1f8d2ba016e69a79ccb921c93d23411013319b251a7a6b929bf0fb4cdc0f4d080f32290db994d7cefa964bb2c0e945784e6c5d7e49d7ef4ff79c11e025302a18fff049d7a1311094478dbc9cddf86cbccaec36cbef2b3c6996449acc3023570cab6aa897a055573b8511beb264c15be958b23cd23a821fe3de69e7ac3137e8ed4bb9a3315fc89ec88f6b13ece9b4104bcfd1c4a1d89a68b0bac752c70ab81b05ef44bd88db72ff84239007763dda2b53b13e82e0047a43834369b043eb9c9e90637e82c3db02e49a39d8dc24c386e33aafb198a46424895350f4eb05b0165788df1f5ecc7871eba2920a251e932ecd7fcf62552db8a4248e1361df2aa687632428ab08c4cd969b014d23e9fa7f8ef2c5e7f2ba6117e96a28ee8be2d3ce30c75ad6e7ebe20a931b009e371be7f5c91bb1e42d7d1c0176d2e4cc2c8e5e8f05dbea7c0fdc242b6ed32dce308cf9fd2a6f1356fe464bb9e200e81fa390117a243f7b8597ed973b6123f6c5f5d98ecff3dd176f841ec0f5f91bf227bbbf17443557c106b725523e0a5d88fed8b4ea051dd08b1ef32f890c046c8fcd22c95b5c767a8af33e523d0368371b5d0f3bd613ac6fd5fcb16e13cd1348aacc138fdb1ea907a4ccdd013ef3e70bb80e8ab8acbf73cc11485041659dd3764c195ab5731f7d04b216cfb8b9b217da4a6737a33f2228b1163c1f498a185dc43a09302f6acf163935e2e3bc0205947ba333a3a9404079ad008545bf7d633b716f0ef4535d358b145edba3b7da8ebd60d3f2739ac8af7e9b970254d041f1bb9c7572b336cc3d97228ecebc4bec447460887bf50b3c92a895a5e29161f6d1c02eed833958f2057f858ea1819e5c31545ccca2406cce35bc3453ad21bd0712a7f3bfe7c041b59d1dfbec499891d854cdc81588736d80008aada52e63356f2a2d59552410b9d91a3036d07b67cbd1ba1d98b31c89bea654c83344762a0a41683fd2cd5ff7dc6bf96bb81b3fa5480f69244ecebb8bc6f49d79935f5609af3cc012cbe921f536e9e4a86118cbec82a12e3b9c05b72d479f272fc9d384db7090541ac79511b9feaef83d2ea05bf9a724fd18e1e8ca10a66c45fa69eb7465c3c17d4817be0de4e694dcde0a117e07099a8047d6ab47ea1817e318c5c30f74481bff1811b0c7dd794adf07077ab7612148b2dc5d2f7f98d1c9fb0b17f1f124e90390680274ea5b1fb1c4f6ccbe50eb562e8c6dc27b106c33d780f7456c815be3b6469b7c4a5784143bfffc170b3b9804c79b2ea792f702a7377eb9cee01ac7b5924e27b1944116d1fd86dc742ab50b8761ddfd5b2785b109b60389438dcec1b284b3ba06b856ad9b39cb9344b9dc63c145a38c3697c33885ac5ed782289f5e653e09841676897aa20b29f43b99167c5bed461d9bc9c2d6e03c07b4337f0bfa758fa59acb6a288188a315a2b9bc12d61873f98b3624a44c90125a67132a52ca0d743745c2aefb5aecc5164c9e35c875a3b7a988012649c591a608a9ef5262c06ca66ef694ef06fd5e3894e7cbdc93c82dfa33d96378e86b1d9c73901d439a00eb39a57716665faf02a0df3440f9d5ad27ef970c0c3617939c602b72f652031068b96afeddd07064c969639455211039357273a66f6ebef14dc3ba9a941a600bd9f68337a319452ecfe5cea1489c9c65b3f907afaf2d8a4c5364a51b8157bb170159220beade61dea40f368918e40f6d1ee4d90f86a8f9c37cd0f600e6f1da996ad4ec974b1e5704ee23c959c4ccc13036b90bd19a9fe9f7fba395d79a6afc4ceb861ba072bfd97bb0fa6c3d85afe6d6cc30ac3e4ee8f3e628dc6c49e630e61c1880b3cb59951b81b8897d138253cf9bd9779986137e39c24f893ea9abf53e77b163c97472231c7faf764e69c1ba3fe5619be20afc4c1d4d9c86685ebb4fb704598215fa6f7432e61915daa130783d4124e952875fe177061c489b481fb45e986fa437afcb191bfe28793f358475590dabe90041a925bb897bad82285865955855348a8457364c373c2ccac1154b7b81548cd2e06723b216f7cbf0e59339c18668446209239989aafe185a72d9d24212468ec7e487fb4b95b525067bf69940f223647f565ade2c0dfe7bcd0e0b2289df61050294294321ff3c6ddc983ade9376c285e1bd66dbb6bbf4817f0a01507584aec98477c8f871e332b384afca5371995b7febb2f6a4968f20f370b102c293a862bb0cea621ccea12d1661003b21b135d9e2fbb0fc9df8dccd787d7a42c2729a65f780643e35f9fcbcb62b82e9cdb5b5740636ad7424cda5f1b228221acd26cf78520d4b1e14c1c2f9747dedcc83424ab65c2e14365b3c63cb3294397ee829024f182d39d514dfada430222f88e635c6b319df9431af221ac110954d05ec2dc353880eedfd3fa26ad3b0bce804af4c67bbfa03e846c7d2b5b7d7ff30df68e7e87500506e403b2d260a298a51c4dde2abcbb08ca5b5f85f15fe18ba5c9c06d37564960befc418d079d1b81562286b2d63d5e43da6ae6e71f0e40a0f2535d7444770c93590ebf0280a1f9a9c0161bd6777ded0d56e5629d615f2683d9c94dac18f7d348f725bf067125f17f357a2dd5cfd7d4f535808ba21bdc4f77025ccfd51e8efe5b3954fe695f380634f17e43f0f5e218098f32418b1a9f628f3b031cfa381e621458496680bf6815efc0e5201ea3e502c1d67e13a957a4c768700409c1e1cc250e24292701d8bec0adb402fbd5fdb65198da05cf1948e23f29ae4e9c8cb97629623dce04efdbfa0296e519dbcf0864568827d622f26bb80ad52ed6042f170500d8162cabecdeefd53201fe53e01568dadaf1c885b39559f495f0ec71eeb8d94cbf136ca7181dbc3804112c2315f28aaef1b622511500ca59c7a2bada3ec81f0a8c5a5c9608569bbd4f0a25ef65dad8bd2d3582a749a27227a0c76d4a3cfad05a6b55c6aa2be8c3bf9e33336d4cce4f4fd8aea5087fe658d2d25ff792cbcbe037fe37c9b29b95d2ba18fab036073146dd0a3197106a28974006d516859c4bd27a5f860eb96fbe35d7bd8be03a369ff01d1d43c282cf72ceaf10ffed1e5aa4cfa5c168083b0dcc391ae77c321f2d1f7febd00dfe08b4ceb046a841d02a158c5d2e67ecbd655ee50444e7583b19f7d409e98439801aef3ef72c84c891fc38c68d953b3a19124f21f30fd9b1e70a38da7cc7f22b7be06219920918d9f070f40516fbae684306708dd86c278e7f5fde59ea7746022e5ed8b43ec58ce46ffeff5b2b0b9dd18a2c87c23bc62847edbfa0aa87bf3900c6c9b153d40bb05d00b45ded3addc411494589aa550adcbd154b74e9a5e924b6a55cab8bda5f5567f3a094a317b00ec4f022000cf1ea38f4d6aa79092a2412691eb0c1a9d683ac7c48247a7e4dea2618e0a9a10c1241102ce0ecfd1a28efc144f8ac1abee4b9a176d98c433e63391432f2c903e5743de48b2db2ee3279b4db51f3aa56da1bb01d344c173dac0ddb2534fc5757fcc4e5482695d11ff79466bd9a3e387fee47938fea75355216461e31cda010ca5754d6ed79e8b0901dc95f6ba95dc279e3f96b8fedbba8ec04ff7afc1b427dc920ea3fbd2bc5c67eaa66bfc5b4276c4f52bd020a662afc1944735cb504170e3ac2b6d5aa96b03ef763a1b32373f48c983fcd10e50e5c1cc6a5ab5fd565bca3a8a129061dbeb0e0c9c6b815df8c96fcdad3aefb0bb93ef3f45e2664fc815dcd6a57b3ee60818b19a31f52096631261522da66c98cf3df05728803a67e6eff27075d67258dd25bae0f433b7b2fb8c03a5c1333c3088d672de7cd74843597ef1484ee6e82ece4e4165a927e4be7b93b72af6cc8569ddc2de97ece7a77fca5049f30398434aacd7a43488489180ccc55667fff4cdbba5eac321cf271e3ecbc439df6b5c6051f6024abc542335361f4406f9398f675c6da9843555fc39ab763e45b8ea2fed0e7c1fce8c86bf0cf88ea14074c796792819d45eb52cbd8ce9c832986414397a46a458022d0132df796351ef64d21ff4b9e4c82e8f584f8ecfd4c9643ae9b4fa6d2dc1894e7437d9d7b51462ecd3aba41d00e2fa4f5e0b2667e2283078ab34fc6897b090d5deec56c672ae02671991d40c2d0708a64de2aefdaf05dadd76ea09f017aa37faffa473cb73528b08aeb6927728e86b98b3a20ff8c690e49e4b12e00702dc8dc078db6993aeae48a906f3dc3eae09578c962528d10e7eb4b8f9146f14b648696e2a8e28cd10b55d63916bd30a0f2f1e4c1966ebf20ed65f66292305cf89b4", 0x1000, 0x7}], 0x801000, &(0x7f0000002800)={[{@fat=@check_strict}, {@nodots}, {@fat=@nfs_nostale_ro}, {@fat=@sys_immutable}], [{@subj_user={'subj_user', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) readlinkat(r0, &(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)=""/168, 0xa8) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r1, 0xffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x145142, 0x0) sendfile(r2, r1, 0x0, 0x108000001) openat(r0, &(0x7f00000029c0)='./file1\x00', 0x0, 0x10) 07:45:31 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=tcp,port=']) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000940)={0x18, 0x1, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@qipcrtr, &(0x7f00000001c0)=0x80) open$dir(&(0x7f0000000040)='./file1\x00', 0x101a00, 0x14) 07:45:31 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0), 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:45:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2000000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:45:31 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1851.307486] 9pnet: p9_fd_create_tcp (12466): problem connecting socket to 127.0.0.1 07:45:31 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:31 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:45:32 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0), 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1851.451903] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1851.455797] EXT4-fs (loop4): get root inode failed [ 1851.457266] EXT4-fs (loop4): mount failed 07:45:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1851.523812] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1851.550744] EXT4-fs (loop0): get root inode failed [ 1851.552093] EXT4-fs (loop0): mount failed [ 1865.003659] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:45:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:45:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0), 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:45:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:45:53 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:45:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0), 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:45:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2010000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:45:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03000000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1872.520081] EXT4-fs error (device loop0): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.0: invalid block 07:45:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1872.524606] EXT4-fs (loop0): get root inode failed [ 1872.525622] EXT4-fs (loop0): mount failed 07:45:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1872.645079] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1872.658646] EXT4-fs (loop1): get root inode failed [ 1872.659457] EXT4-fs (loop1): mount failed [ 1872.697657] EXT4-fs error (device loop0): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.0: invalid block [ 1872.700770] EXT4-fs (loop0): get root inode failed [ 1872.701595] EXT4-fs (loop0): mount failed [ 1872.782136] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1872.796931] EXT4-fs (loop4): get root inode failed [ 1872.798327] EXT4-fs (loop4): mount failed [ 1886.677644] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:46:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:15 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:46:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:46:15 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03000000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:15 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8cffffff00000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:46:15 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:15 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1894.633669] EXT4-fs error (device loop0): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.0: invalid block [ 1894.643814] EXT4-fs (loop0): get root inode failed [ 1894.645144] EXT4-fs (loop0): mount failed 07:46:15 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1894.676598] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block 07:46:15 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1894.707232] EXT4-fs (loop1): get root inode failed [ 1894.708642] EXT4-fs (loop1): mount failed 07:46:15 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:15 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03000000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:15 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf6ffffff00000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:46:15 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf6619c7a437322b1d1b6ec8e43c", 0x91, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:46:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:46:15 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03000000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x10800, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x300, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @ipv4={'\x00', '\xff\xff', @broadcast}, 0xd51}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) pread64(r3, &(0x7f00000000c0)=""/65, 0x41, 0x0) accept4$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0xfffffffffffffd83, 0x80000) openat(r2, 0x0, 0x0, 0x0) [ 1894.979263] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 1895.002108] EXT4-fs (loop0): get root inode failed [ 1895.003709] EXT4-fs (loop0): mount failed [ 1895.040717] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 1895.044794] EXT4-fs (loop1): get root inode failed [ 1895.047598] EXT4-fs (loop1): mount failed [ 1895.067968] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1907.544523] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:46:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/213, 0xd5}, {&(0x7f0000000600)=""/229, 0xe5}, {&(0x7f00000001c0)=""/100, 0x64}], 0x3, 0xfc, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x4, @private0}, 0x1c) poll(&(0x7f0000000080)=[{}], 0x1, 0xfffffffc) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume_offset', 0x0, 0x0) poll(&(0x7f0000000080)=[{}], 0x1, 0xfffffffc) r3 = dup2(r0, r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/partitions\x00', 0x0, 0x0) bind$inet6(r3, &(0x7f00000010c0)={0xa, 0x4e22, 0x4c, @dev={0xfe, 0x80, '\x00', 0x28}, 0x6}, 0x1c) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = dup(r5) r7 = dup(r6) sendmsg$IPCTNL_MSG_EXP_GET(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000010201a60b000000000000000a000000487e01802c0001808900030000000000050000000000000000000000140004000000000000000000"], 0x50}}, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x7, &(0x7f0000001100)=0x1, 0x4) pread64(r4, &(0x7f0000000040)=""/4117, 0x1015, 0x120000) 07:46:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:46:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xff00000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:46:36 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:46:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:46:36 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03000000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1916.035687] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1916.106687] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 1916.111163] EXT4-fs (loop1): get root inode failed [ 1916.112609] EXT4-fs (loop1): mount failed 07:46:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1916.141472] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. 07:46:36 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03000000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, 0x0, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xffff000000000000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1916.213646] EXT4-fs error (device loop0): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.0: invalid block [ 1916.226526] EXT4-fs (loop0): get root inode failed [ 1916.227914] EXT4-fs (loop0): mount failed 07:46:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) 07:46:36 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1916.262009] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:46:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1916.951674] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1929.968474] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:46:58 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:46:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:58 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:46:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x22, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:46:58 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:58 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:58 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) 07:46:58 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 1938.319836] 9pnet: Insufficient options for proto=fd [ 1938.330715] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 1938.339600] EXT4-fs (loop1): get root inode failed [ 1938.340938] EXT4-fs (loop1): mount failed [ 1938.355750] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1938.358675] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1938.438706] EXT4-fs error (device loop4): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.4: invalid block 07:46:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:59 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) dup2(r0, 0xffffffffffffffff) [ 1938.474652] EXT4-fs error (device loop0): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.0: invalid block [ 1938.480273] EXT4-fs (loop4): get root inode failed [ 1938.481716] EXT4-fs (loop4): mount failed 07:46:59 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:46:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1938.500676] EXT4-fs (loop0): get root inode failed [ 1938.502175] EXT4-fs (loop0): mount failed [ 1938.560226] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:46:59 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x2c, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:46:59 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:46:59 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) dup2(r0, 0xffffffffffffffff) 07:46:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, 0x0}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1938.648211] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1938.673675] 9pnet: Insufficient options for proto=fd 07:46:59 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:46:59 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1938.771222] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1938.856262] EXT4-fs error (device loop4): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.4: invalid block [ 1938.868078] EXT4-fs (loop4): get root inode failed [ 1938.869616] EXT4-fs (loop4): mount failed [ 1951.882865] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:47:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:47:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:47:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:47:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:47:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:47:21 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:47:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x22, {'wfdno', 0x3d, r1}}) 07:47:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) dup2(r0, 0xffffffffffffffff) [ 1960.915121] 9pnet: Insufficient options for proto=fd [ 1960.923877] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1960.959983] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:47:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1961.016678] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 1961.029434] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 1961.043661] EXT4-fs (loop0): get root inode failed [ 1961.045178] EXT4-fs (loop0): mount failed [ 1961.074869] EXT4-fs (loop1): get root inode failed [ 1961.076314] EXT4-fs (loop1): mount failed 07:47:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:47:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x22, r1}}) 07:47:21 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:47:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1961.155680] EXT4-fs error (device loop4): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.4: invalid block [ 1961.175719] EXT4-fs (loop4): get root inode failed [ 1961.177100] EXT4-fs (loop4): mount failed [ 1961.187699] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1961.193117] 9pnet: Insufficient options for proto=fd 07:47:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 07:47:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1961.341900] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1961.385220] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 1961.397786] EXT4-fs (loop1): get root inode failed [ 1961.399124] EXT4-fs (loop1): mount failed [ 1973.607955] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:47:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) 07:47:48 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:47:48 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:47:48 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:47:48 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:47:48 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:47:48 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:47:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x2c, r1}}) [ 1988.202183] 9pnet: Insufficient options for proto=fd [ 1988.243057] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:47:48 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:47:48 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:47:48 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:47:49 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x22}) [ 1988.342557] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 1988.369136] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 1988.371639] EXT4-fs (loop1): get root inode failed [ 1988.374242] EXT4-fs (loop1): mount failed [ 1988.394722] EXT4-fs (loop4): get root inode failed [ 1988.396042] EXT4-fs (loop4): mount failed 07:47:49 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1988.413739] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 1988.416796] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1988.444611] EXT4-fs (loop0): get root inode failed [ 1988.445997] EXT4-fs (loop0): mount failed [ 1988.457939] 9pnet: Insufficient options for proto=fd 07:47:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 1988.666917] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2000.095039] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:48:07 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:07 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:07 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:48:07 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:48:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:48:07 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:48:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 2007.053226] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.6'. 07:48:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2007.110655] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 2007.140626] EXT4-fs (loop0): get root inode failed [ 2007.142066] EXT4-fs (loop0): mount failed 07:48:07 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:48:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:07 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2007.235848] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 2007.241895] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 07:48:07 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2007.270710] EXT4-fs (loop1): get root inode failed [ 2007.272215] EXT4-fs (loop1): mount failed [ 2007.286122] EXT4-fs (loop4): get root inode failed [ 2007.287375] EXT4-fs (loop4): mount failed 07:48:08 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:48:08 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556ffcf66", 0x85, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:48:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 2007.393967] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 2007.396072] EXT4-fs (loop0): get root inode failed [ 2007.396753] EXT4-fs (loop0): mount failed [ 2007.412719] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2007.505779] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2007.512762] EXT4-fs (loop4): get root inode failed [ 2007.514272] EXT4-fs (loop4): mount failed [ 2022.998876] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:48:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x2}}) 07:48:32 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:32 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) 07:48:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:32 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:32 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:48:32 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:48:32 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2032.321065] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:48:33 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:48:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2032.360699] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2032.393595] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:48:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2032.456776] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 2032.460036] EXT4-fs (loop1): get root inode failed [ 2032.461176] EXT4-fs (loop1): mount failed 07:48:33 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2032.486577] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 07:48:33 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2032.500598] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2032.517272] EXT4-fs (loop0): get root inode failed [ 2032.519048] EXT4-fs (loop0): mount failed [ 2032.533016] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 07:48:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2032.553773] EXT4-fs (loop4): get root inode failed [ 2032.554932] EXT4-fs (loop4): mount failed [ 2032.591978] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.6'. 07:48:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2032.716209] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2032.761700] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 2032.766180] EXT4-fs (loop1): get root inode failed [ 2032.767844] EXT4-fs (loop1): mount failed [ 2045.691345] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:48:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) dup2(r0, 0xffffffffffffffff) 07:48:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x7}}) 07:48:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:48:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100"/140], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:53 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:48:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:48:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2053.167960] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2053.178515] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:48:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100"/140], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2053.288557] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 2053.293702] EXT4-fs (loop1): get root inode failed [ 2053.294959] EXT4-fs (loop1): mount failed 07:48:54 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, &(0x7f0000000240)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2053.357257] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 2053.363572] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2053.367587] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2053.383677] EXT4-fs (loop0): get root inode failed [ 2053.385043] EXT4-fs (loop0): mount failed [ 2053.386622] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2053.393236] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:48:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100"/140], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2053.439051] EXT4-fs (loop4): get root inode failed [ 2053.440595] EXT4-fs (loop4): mount failed 07:48:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:48:54 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:54 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:48:54 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:48:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2053.605118] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2053.685207] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 2053.690745] EXT4-fs (loop1): get root inode failed [ 2053.692171] EXT4-fs (loop1): mount failed [ 2053.698678] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2053.706643] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2053.764711] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 2053.773137] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2053.778731] EXT4-fs (loop0): get root inode failed [ 2053.780077] EXT4-fs (loop0): mount failed [ 2053.794153] EXT4-fs (loop4): get root inode failed [ 2053.796139] EXT4-fs (loop4): mount failed [ 2065.840431] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:49:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x8}}) 07:49:14 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) 07:49:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:14 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:14 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, &(0x7f0000000240)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:49:14 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:49:14 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:14 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662a", 0x7f, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 2073.609680] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2073.614714] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2073.662618] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 2073.667047] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2073.681716] EXT4-fs (loop4): get root inode failed [ 2073.683873] EXT4-fs (loop4): mount failed [ 2073.692867] EXT4-fs (loop0): get root inode failed [ 2073.694229] EXT4-fs (loop0): mount failed [ 2073.696719] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block 07:49:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2073.709947] EXT4-fs (loop1): get root inode failed [ 2073.711564] EXT4-fs (loop1): mount failed 07:49:14 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:14 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:14 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, &(0x7f0000000240)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:49:14 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662a", 0x7f, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 2073.858722] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2073.916246] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2073.921075] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 2073.927936] EXT4-fs (loop0): get root inode failed [ 2073.929693] EXT4-fs (loop0): mount failed 07:49:14 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:49:14 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662a", 0x7f, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 2074.127781] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2074.139649] EXT4-fs (loop4): get root inode failed [ 2074.141198] EXT4-fs (loop4): mount failed [ 2087.918889] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:49:37 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900"/210], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x9}}) 07:49:37 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:49:37 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:49:37 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a556", 0x82, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:49:37 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:49:37 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2096.791721] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2096.879249] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2096.885256] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2096.897595] EXT4-fs (loop4): get root inode failed [ 2096.899008] EXT4-fs (loop4): mount failed 07:49:37 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2096.909739] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 22181 (inode size 256) [ 2096.911612] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 2096.933144] EXT4-fs (loop0): get root inode failed [ 2096.934347] EXT4-fs (loop0): mount failed [ 2096.947019] EXT4-fs (loop1): get root inode failed [ 2096.948570] EXT4-fs (loop1): mount failed 07:49:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200100004000000097"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:37 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2097.038631] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:49:37 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:49:37 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2097.090906] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:49:37 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:37 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662a", 0x7f, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:49:37 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:49:37 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2097.196778] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2097.217691] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:49:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200100004000000097"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2097.222113] EXT4-fs (loop4): get root inode failed [ 2097.223973] EXT4-fs (loop4): mount failed [ 2097.276997] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 2097.282990] EXT4-fs (loop0): get root inode failed [ 2097.284056] EXT4-fs (loop0): mount failed [ 2097.336990] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2097.370648] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 2097.383709] EXT4-fs (loop1): get root inode failed [ 2097.384936] EXT4-fs (loop1): mount failed [ 2108.997961] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:49:58 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:49:58 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0xa}}) 07:49:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:49:58 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:49:58 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662a", 0x7f, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:49:58 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200100004000000097"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2118.042762] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2118.078675] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2118.105276] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2118.111708] EXT4-fs (loop4): get root inode failed [ 2118.113149] EXT4-fs (loop4): mount failed [ 2118.156275] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 2118.163775] EXT4-fs (loop1): get root inode failed [ 2118.165005] EXT4-fs (loop1): mount failed 07:49:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:58 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:49:58 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2118.219226] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 07:49:58 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2118.253973] EXT4-fs (loop0): get root inode failed [ 2118.255681] EXT4-fs (loop0): mount failed 07:49:58 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2118.315152] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. 07:49:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2118.339124] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:49:59 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662a", 0x7f, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:49:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2118.443573] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2118.467105] EXT4-fs (loop4): get root inode failed [ 2118.468570] EXT4-fs (loop4): mount failed [ 2118.477666] EXT4-fs error (device loop1): __ext4_iget:4908: inode #2: block 179756213: comm syz-executor.1: invalid block [ 2118.480786] EXT4-fs (loop1): get root inode failed [ 2118.482142] EXT4-fs (loop1): mount failed [ 2132.519803] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:50:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0xb}}) 07:50:20 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:50:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:50:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:50:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a5", 0x81, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:50:20 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:50:20 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:50:20 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2139.466028] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. 07:50:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2139.486774] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2139.526190] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extra_isize 165 (inode size 256) [ 2139.533160] EXT4-fs (loop0): get root inode failed [ 2139.534068] EXT4-fs (loop0): mount failed [ 2139.542102] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 07:50:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:50:20 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2139.570586] EXT4-fs (loop4): get root inode failed [ 2139.572069] EXT4-fs (loop4): mount failed 07:50:20 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:50:20 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:50:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2139.649579] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:50:20 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6", 0x80, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:50:20 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2139.705098] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2139.768247] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 2139.768597] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2139.774247] EXT4-fs (loop0): get root inode failed [ 2139.775244] EXT4-fs (loop0): mount failed [ 2139.778590] EXT4-fs (loop4): get root inode failed [ 2139.779779] EXT4-fs (loop4): mount failed [ 2151.528770] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:50:39 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:50:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:50:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:50:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x10}}) 07:50:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:50:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:50:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:50:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6", 0x80, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 2158.657886] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2158.676078] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:50:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:50:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:50:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2158.750889] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 2158.771858] EXT4-fs (loop0): get root inode failed [ 2158.773702] EXT4-fs (loop0): mount failed 07:50:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2158.781636] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2158.786632] EXT4-fs (loop4): get root inode failed [ 2158.787844] EXT4-fs (loop4): mount failed 07:50:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433", 0x61, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:50:39 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2158.859634] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:50:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:50:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6", 0x80, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 2158.873613] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2159.001776] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2159.011636] EXT4-fs (loop4): get root inode failed [ 2159.012741] EXT4-fs (loop4): mount failed [ 2159.027620] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: bad extended attribute block 3761779282 [ 2159.035966] EXT4-fs (loop0): get root inode failed [ 2159.037504] EXT4-fs (loop0): mount failed [ 2172.168598] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:51:00 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x0, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:00 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:00 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:51:00 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',\x00']) 07:51:00 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:51:00 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a5", 0x81}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:51:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:51:00 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2180.255689] 9pnet: Insufficient options for proto=fd 07:51:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2180.303640] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. 07:51:01 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:51:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2180.466725] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2180.474660] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated [ 2180.478728] EXT4-fs (loop4): get root inode failed [ 2180.480080] EXT4-fs (loop4): mount failed [ 2180.495036] EXT4-fs (loop0): get root inode failed [ 2180.496685] EXT4-fs (loop0): mount failed 07:51:01 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:51:01 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x0, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2180.580851] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. 07:51:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x50) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0xffffff73, 0x0, 0x0}, 0x58) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x4000, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000100), 0x2000081, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = signalfd(r1, &(0x7f0000000000)={[0x5]}, 0x8) ioctl$FICLONE(r0, 0x40049409, r3) 07:51:01 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a5", 0x81}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 2180.664390] 9pnet: Insufficient options for proto=fd 07:51:01 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2180.690097] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2180.707623] EXT4-fs (loop1): get root inode failed [ 2180.708732] EXT4-fs (loop1): mount failed 07:51:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2180.802556] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2180.812195] EXT4-fs (loop4): get root inode failed [ 2180.813572] EXT4-fs (loop4): mount failed [ 2180.894013] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated [ 2180.900677] EXT4-fs (loop0): get root inode failed [ 2180.902050] EXT4-fs (loop0): mount failed [ 2192.202158] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:51:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a5", 0x81}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:51:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:51:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x0, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:21 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:51:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000100)='./file1/../file0\x00', &(0x7f0000000180), 0x8000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid={'afid', 0x3d, 0xffffffff}}, {@access_client}, {@uname={'uname', 0x3d, 'wfdno'}}, {@cache_loose}, {@version_9p2000}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '.^,'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, '9p\x00'}}, {@audit}]}}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@audit}]}}) 07:51:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2200.640611] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2200.642640] EXT4-fs (loop1): get root inode failed [ 2200.643368] EXT4-fs (loop1): mount failed [ 2200.674823] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2200.681661] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2200.689658] EXT4-fs (loop4): get root inode failed [ 2200.691084] EXT4-fs (loop4): mount failed 07:51:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:51:21 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 2200.768212] EXT4-fs error (device loop0): ext4_fill_super:4973: inode #2: comm syz-executor.0: iget: root inode unallocated [ 2200.771954] EXT4-fs (loop0): get root inode failed [ 2200.772822] EXT4-fs (loop0): mount failed [ 2200.797787] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2200.801418] EXT4-fs (loop1): get root inode failed [ 2200.802542] EXT4-fs (loop1): mount failed [ 2212.465292] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 07:51:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:51:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = syz_io_uring_setup(0x42f5, &(0x7f0000000080)={0x0, 0x4ec6, 0x4, 0x3, 0x306, 0x0, r0}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000180)) r3 = syz_open_dev$vcsn(&(0x7f0000000200), 0x0, 0x2080) r4 = timerfd_create(0x1, 0x80800) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000180)=0x6, 0x4) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000280)={0x1, 0x0, &(0x7f0000000240)=[r3, r4, r5]}, 0x3) 07:51:42 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a5", 0x81, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) 07:51:42 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x0, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:51:42 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x0, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:51:42 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2221.738575] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2221.742458] EXT4-fs (loop1): get root inode failed [ 2221.743538] EXT4-fs (loop1): mount failed 07:51:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) [ 2221.812747] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: bad extended attribute block 3761779282 [ 2221.829191] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2221.834468] EXT4-fs (loop4): get root inode failed [ 2221.835760] EXT4-fs (loop4): mount failed 07:51:42 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x0, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2221.864888] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2221.866803] EXT4-fs (loop0): group descriptors corrupted! [ 2221.913142] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2221.916890] EXT4-fs (loop1): get root inode failed [ 2221.917960] EXT4-fs (loop1): mount failed 07:51:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:42 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:42 executing program 7: accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71, 0x20, &(0x7f0000000340)=@llc={0x1a, 0x200, 0x0, 0x0, 0x9, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x806, 0x5) ftruncate(r0, 0x1000003) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000004c0)={'NETMAP\x00'}, &(0x7f0000000500)=0x1e) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x0, 0x6, 0x2, 0x4, 0x59, @dev={0xfe, 0x80, '\x00', 0x36}, @mcast1, 0x7800, 0x1, 0x2, 0x2d2a}}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000480)={0x5, 0x40, 0x251b, 0x0, 0x7}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 07:51:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:51:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32", 0x79, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) 07:51:42 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, 0x0, 0x0, 0xd1) dup2(0xffffffffffffffff, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) dup(r2) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x50}}, 0x0) ioctl$CDROM_TIMED_MEDIA_CHANGE(0xffffffffffffffff, 0x5396, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000140)="201900d07642da921fd61d12430c6c6b8c0ac5c96e48065e24ecf3bb8ce311427a", 0x21, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f00000002c0)="ed4100e55569ebafb0b5a01a0000080000dff4655fe0f4655fe0f4655f0000000000000400044cb4b5dcb60a7936f0a4c9b729183de035589d5fb686e75ce16a2fe6dc6ca1021c31b37ae49a3afa3e08e3dc2f10dbd5ae01bd6eba8441b837e433366886c79c0065523238e02e42335490e0756c8877c77f32debb18de662ae6a5", 0x81, 0x2100}], 0x80, &(0x7f00000000c0)={[{@data_writeback}]}) ftruncate(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = dup2(r0, 0xffffffffffffffff) unlinkat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x150) [ 2222.069145] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.5'. 07:51:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c03000000"], 0x160}}, 0x0) socketpair(0x3a, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r4, 0x100}, {r2, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) 07:51:42 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x81000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "dffd9645889744e4", "e04736b90753af7056f5587dad6c8dbcb1457ffc43bdfe8df33093946ed77e4c", "30ca3eb9", "c1ff4a2f52816a91"}, 0x38) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="021a117678f408004e010000001000", 0x10) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff9) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020005000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}}, 0x0) socketpair(0x0, 0x80000, 0x4c, &(0x7f0000000280)) ppoll(&(0x7f0000000180)=[{r6, 0x100}, {r4, 0x80}], 0x2, &(0x7f0000000200), &(0x7f0000000240)={[0x101]}, 0x8) [ 2222.133391] EXT4-fs error (device loop1): ext4_fill_super:4973: inode #2: comm syz-executor.1: iget: root inode unallocated [ 2222.142166] EXT4-fs (loop1): get root inode failed [ 2222.143376] EXT4-fs (loop1): mount failed [ 2222.236087] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2222.238626] EXT4-fs (loop0): group descriptors corrupted! VM DIAGNOSIS: 07:56:47 Registers: info registers vcpu 0 RAX=ffffffff83e1f7f0 RBX=ffffffff84e322c0 RCX=ffffffff83e0753c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1fbb3 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670cc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1f7fe RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055cfdf293678 CR3=000000000dafc000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000006000000040000000000000000 XMM02=61746f7420636578650a0a0100010101 XMM03=7473657220726f74756365786511006c XMM04=0a006e65672063657865080073747261 XMM05=636578650a006873616d732063657865 XMM06=7a756620636578650900736465657320 XMM07=74616469646e616320636578650e007a XMM08=726f74756365786511006c61746f7420 XMM09=20636578650800737472617473657220 XMM10=006873616d7320636578650a006e6567 XMM11=6578650900736465657320636578650a XMM12=6e616320636578650e007a7a75662063 XMM13=69727420636578650b00657461646964 XMM14=696d696e696d20636578650d00656761 XMM15=000073746e696820636578650a00657a info registers vcpu 1 RAX=ffffffff83e1f7f0 RBX=ffff88800852b300 RCX=ffffffff83e0753c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1fbb3 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670cc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1f7fe RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f00d2a7d010 CR3=000000000dafc000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000413b24c000000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000